0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Configuring SonicWALL Firewalls (Paperback): Dan Bendell Configuring SonicWALL Firewalls (Paperback)
Dan Bendell
R1,115 Discovery Miles 11 150 Ships in 10 - 15 working days

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years.
This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.
* First book to deliver an in-depth look at the SonicWALL firewall product line
* Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls
* Includes advanced troubleshooting techniques and the SonicWALL Security Manager

Securing HP NonStop Servers in an Open Systems World - TCP/IP, OSS and SQL (Paperback, 2nd Revised edition): XYPRO Technology... Securing HP NonStop Servers in an Open Systems World - TCP/IP, OSS and SQL (Paperback, 2nd Revised edition)
XYPRO Technology Corp
R2,565 Discovery Miles 25 650 Ships in 10 - 15 working days

Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing environments.
HP NonStop Servers are used by Financial, Medical, Manufacturing enterprises where there can be no down time. Securing HP NonStop Servers in an Open Systems World: OSS, TCP/IP, and SQL takes a wide angle view of NonStop Server use. This book addresses protection of the Open Systems Services environment, network interfaces including TCP/IP and standard SQL databases. It lays out a roadmap of changes since our first book HP has made to Safeguard, elaborating on the advantages and disadvantages of implementing each new version. Even the security aspects of managing Operating System upgrades are given attention. Auditors, security policy makers, information security administrators and system managers will find the practical information they need for putting security principles into practice to meet industry standards as well as compliance regulations.
* Addresses security issues in Open Systems Services
* Critical security topics for network interfaces TCP/IP, SQL, etc.
* Updates to safeguard thru since publication of XYPRO's last book

Ethical Impact of Technological Advancements and Applications in Society (Hardcover): Rocci Luppicini Ethical Impact of Technological Advancements and Applications in Society (Hardcover)
Rocci Luppicini
R4,943 Discovery Miles 49 430 Ships in 18 - 22 working days

In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer ethics, engineering ethics, and biotech ethics as well as nascent areas of research such as nanoethics, artificial morality, and neuroethics.

The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover): Michael Gentile, Ron Collette, Thomas D. August The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover)
Michael Gentile, Ron Collette, Thomas D. August
R1,106 Discovery Miles 11 060 Ships in 18 - 22 working days

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R879 R734 Discovery Miles 7 340 Save R145 (16%) Ships in 10 - 15 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover): Laurence... IT Governance in a Networked World - Multi-sourcing Strategies and Social Capital for Corporate Computing (Hardcover)
Laurence Lock Lee
R4,181 Discovery Miles 41 810 Ships in 18 - 22 working days

The outsourcing of IT services over the past decade has triggered a need to reassess how IT governance and sourcing should be conducted. ""IT Governance in a Networked World: Multi-Sourcing Strategies and Social Capital for Corporate Computing"" provides theories concerning corporate social capital, intellectual capital, and social networks for academicians, practitioners, and field researchers. This book addresses relationship challenges in a world that is becoming increasingly networked, offering useful frameworks and practices for IT governance.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R5,768 Discovery Miles 57 680 Ships in 18 - 22 working days
Advancing Consumer-Centric Fog Computing Architectures (Hardcover): Kashif Munir Advancing Consumer-Centric Fog Computing Architectures (Hardcover)
Kashif Munir
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.

Funny Spam Emails (Paperback): Manley Peterson Funny Spam Emails (Paperback)
Manley Peterson
R295 Discovery Miles 2 950 Ships in 18 - 22 working days
Wireless Networks - From the Physical Layer to Communication, Computing, Sensing and Control (Hardcover): Giorgio... Wireless Networks - From the Physical Layer to Communication, Computing, Sensing and Control (Hardcover)
Giorgio Franceschetti, Sabatino Stornelli
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days

Awarded by the International Calabria's Prize!
This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and mathematics. As communications technology becomes increasingly wireless, an interdisciplinary viewpoint is necessary for professionals to correct problems and avoid others before they occur.
"Wireless Networks" covers critical technology within WLAN, ad hoc networks, data distribution, TV, radio, and personal mobile devices. As networks become wireless, engineers face increased difficulty securing its malleable boundaries. This book discusses security solutions such as sensor technology that prevent unwanted intrusion. Connectivity is also addressed, featuring chapters on antennas, bandwidth and frequencies. Editors Franceschetti and Stornelli have done a great service to the wireless communications community in creating a compendium that delivers this spectrum of essential information in one reference.
*Presents a uniquely panoramic view of wireless networks with viewpoints from engineering, computing, and mathematics
*The technology is discussed in theory as well as in practice to help engineers design and modify networks
*Globally recognized experts share their critical insight on sensor technology, transfering protocol, ad-hoc networks, and more

S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release... S5000F, International specification for in-service data feedback, Issue 3.0 (Part 1/2) - S-Series 2021 Block Release (Hardcover)
Asd
R1,137 Discovery Miles 11 370 Ships in 18 - 22 working days
Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover):... Handbook of Research on Grid Technologies and Utility Computing - Concepts for Managing Large-Scale Applications (Hardcover)
Emmanuel Udoh, Frank Zhigang Wang
R6,632 Discovery Miles 66 320 Ships in 18 - 22 working days

Today, many institutions and corporations are involved in various grid researches that involve improvement in concepts, protocols, applications, methods, and tools. To help capture the rapid growth in grid concepts and applications and chart the future direction in this field, a resource compiling current advances in grid computing is essential. The Handbook of Research on Grid Technologies and Utility Computing: Concepts for Managing Large-Scale Applications provides a compendium of terms, definitions, and explanations of concepts, issues, processes, and trends in grid technology. As the first book collection of its kind, this reference features current articles presenting comprehensive coverage of grid technologies valuable to any researcher, practitioner, or academician in grid computing.

Software Piracy Exposed (Paperback): Ron Honick Software Piracy Exposed (Paperback)
Ron Honick
R926 Discovery Miles 9 260 Ships in 10 - 15 working days

This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
* This book is about software piracy--what it is and how it's done
* This is the first book ever to describe how software is actually stolen and traded over the internet
* Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software

Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition): Marvin Zelkowitz Advances in Computers, Volume 67 - Web Technology (Hardcover, 67th edition)
Marvin Zelkowitz
R3,908 Discovery Miles 39 080 Ships in 10 - 15 working days

This volume is number 67 in the series Advances in Computers that began back in 1960. This is the longest continuously published series of books that chronicles the evolution of the computer industry. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 67, subtitled "Web technology," presents 6 chapters that show the impact that the World Wide Web is having on our society today. The general theme running throughout the volume is the ubiquity of web services. Topics such as wireless access and its problems and reliability of web communications are emphasized.


Key features:


- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.
- In-depth surveys and tutorials on software development approaches.
- Well-known authors and researchers in the field.
- Extensive bibliographies with most chapters.
- All chapters focus on Internet and web technology issues.
- Discussion of wireless communication and forensic issues, currently important research areas.

Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover): Chittaranjan Pradhan, Himansu Das,... Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover)
Chittaranjan Pradhan, Himansu Das, Bighnaraj Naik, Nilanjan Dey
R8,036 Discovery Miles 80 360 Ships in 18 - 22 working days

Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.

Security Technology Convergence Insights (Paperback): Ray Bernard Security Technology Convergence Insights (Paperback)
Ray Bernard
R1,843 Discovery Miles 18 430 Ships in 10 - 15 working days

Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management.

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback): Fred Eady Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Paperback)
Fred Eady
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices.
This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work.
The book thoroughly covers:
* Laptop wireless Ethernet card introduction and theory
*Introduction to CompactFlash-to-microcontroller interfacing
* Implementing the laptop wireless Ethernet card in an embedded environment
In addition, the book includes access to a companion website containing all of the code, schematics and programs necessary to implement embedded 802.11 wireless networking.
* Covers the hottest new embedded market area- wireless networking
* Shows designers how to save money and time by using microcontrollers in their embedded wireless designs instead of expensive, complex prefab boards
* Companion website accompanying book contains all the code, schematics and programs necessary to get started now

Network Security, Administration and Management - Advancing Technology and Practice (Hardcover): Dulal Chandra Kar, Mahbubur... Network Security, Administration and Management - Advancing Technology and Practice (Hardcover)
Dulal Chandra Kar, Mahbubur Rahman Syed
R4,953 Discovery Miles 49 530 Ships in 18 - 22 working days

The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes. Network Security, Administration and Management: Advancing Technology and Practice identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.

Amazon Simple Storage Service Console User Guide (Hardcover): Documentation Team Amazon Simple Storage Service Console User Guide (Hardcover)
Documentation Team
R1,159 Discovery Miles 11 590 Ships in 18 - 22 working days
Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover): Jianwen "Wendy" Chen, Yan Zhang, Ron... Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover)
Jianwen "Wendy" Chen, Yan Zhang, Ron Gottschalk
R8,120 Discovery Miles 81 200 Ships in 18 - 22 working days

Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers.

Firewalls - Jumpstart for Network and Systems Administrators (Paperback): John R Vacca, Scott Ellis Firewalls - Jumpstart for Network and Systems Administrators (Paperback)
John R Vacca, Scott Ellis
R2,289 Discovery Miles 22 890 Ships in 10 - 15 working days

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.
-Install and configure proxy-based and stateful-filtering firewalls
-Protect internal IP addresses with NAT and deploy a secure DNS architecture
-Develop an Internet/intranet security policy to protect your organization's systems and data
-Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,135 Discovery Miles 11 350 Ships in 10 - 15 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Computer Security Threats (Hardcover): Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernandez-Carames Computer Security Threats (Hardcover)
Ciza Thomas, Paula Fraga-Lamas, Tiago M. Fernandez-Carames
R3,060 Discovery Miles 30 600 Ships in 18 - 22 working days
Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover): Tolga Soyata Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover)
Tolga Soyata
R4,890 Discovery Miles 48 900 Ships in 18 - 22 working days

Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Network Science - Analysis and…
CAR Pinheiro Hardcover R2,245 Discovery Miles 22 450
PC Interfacing
Pei An Paperback R1,213 Discovery Miles 12 130

 

Partners