0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (844)
  • R500+ (14,098)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover): Luisa Dall'acqua, Irene Maria... Transdisciplinary Perspectives on Risk Management and Cyber Intelligence (Hardcover)
Luisa Dall'acqua, Irene Maria Gironacci
R5,805 Discovery Miles 58 050 Ships in 10 - 15 working days

The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,214 Discovery Miles 12 140 Ships in 12 - 19 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R7,185 R4,946 Discovery Miles 49 460 Save R2,239 (31%) Ships in 12 - 19 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

Design Science Research. Cases (Hardcover, 1st ed. 2020): Jan Vom Brocke, Alan Hevner, Alexander Maedche Design Science Research. Cases (Hardcover, 1st ed. 2020)
Jan Vom Brocke, Alan Hevner, Alexander Maedche
R4,250 Discovery Miles 42 500 Ships in 12 - 19 working days

Design Science Research is a powerful paradigm enabling researchers to make important contributions to society and industry. Simply stated, the goal of DSR is to generate knowledge on how to find innovative solutions to important problems in the form of models, methods, constructs and instantiations. Over the past 20 years, the design science research (DSR) paradigm has developed into an established paradigm in Information Systems Research and it is of strong uptake in many other disciplines, including Management Science and Computer Science. This book provides a collection of twelve DSR cases, presented by experienced researchers in the field. It offers readers access to real-world DSR studies, together with the authors' reflections on their research processes. These cases will support researchers who want to engage in DSR, and represent a valuable addition to existing introductions to DSR methods and processes. Readers will learn from the hands-on experiences of respected experts who have conducted extensive DSR in a range of application contexts.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R6,256 Discovery Miles 62 560 Ships in 10 - 15 working days
Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover): Chittaranjan Pradhan, Himansu Das,... Handbook of Research on Information Security in Biomedical Signal Processing (Hardcover)
Chittaranjan Pradhan, Himansu Das, Bighnaraj Naik, Nilanjan Dey
R8,718 Discovery Miles 87 180 Ships in 10 - 15 working days

Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.

Linksys WRT54G Ultimate Hacking (Paperback): Paul Asadoorian, Larry Pesce Linksys WRT54G Ultimate Hacking (Paperback)
Paul Asadoorian, Larry Pesce
R890 Discovery Miles 8 900 Ships in 12 - 19 working days

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.
* Never before seen and documented hacks, including wireless spectrum analysis
* Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform
* Full coverage on embedded device development using the WRT54G and OpenWRT"

Cryptography and Security in Computing (Hardcover): Jaydip Sen Cryptography and Security in Computing (Hardcover)
Jaydip Sen
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days
Worldwide Intelligent Systems - Approaches to Telecommunications and Network Management (Hardcover): Jay Liebowitz, D.S. Prereu Worldwide Intelligent Systems - Approaches to Telecommunications and Network Management (Hardcover)
Jay Liebowitz, D.S. Prereu
R2,150 Discovery Miles 21 500 Ships in 12 - 19 working days

Telecommunications firms worldwide are actively involved in AI applications for resolving network management and telecommunications problems. This book addresses the following major functional areas: planning, scheduling, monitoring, control, fault classification and diagnosis, training, and help desks. Several AI techniques are applied, including neural networks, expert systems, integrating rule-based systems with case-based reasoning systems, genetic algorithms, distributed AI, and intelligent tutoring systems. It is of interest to researchers and professionals in telecommunication, AI experts, and graduate students.

Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover): Jianwen "Wendy" Chen, Yan Zhang, Ron... Handbook of Research on End-to-End Cloud Computing Architecture Design (Hardcover)
Jianwen "Wendy" Chen, Yan Zhang, Ron Gottschalk
R8,809 Discovery Miles 88 090 Ships in 10 - 15 working days

Cloud computing has become integrated into all sectors, from business to quotidian life. Since it has revolutionized modern computing, there is a need for updated research related to the architecture and frameworks necessary to maintain its efficiency. The Handbook of Research on End-to-End Cloud Computing Architecture Design provides architectural design and implementation studies on cloud computing from an end-to-end approach, including the latest industrial works and extensive research studies of cloud computing. This handbook enumerates deep dive and systemic studies of cloud computing from architecture to implementation. This book is a comprehensive publication ideal for programmers, IT professionals, students, researchers, and engineers.

The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover): Michael Gentile, Ron Collette, Thomas D. August The CISO Handbook - A Practical Guide to Securing Your Company (Hardcover)
Michael Gentile, Ron Collette, Thomas D. August
R1,194 Discovery Miles 11 940 Ships in 10 - 15 working days

The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.

Cybersecurity Education for Awareness and Compliance (Hardcover): Ismini Vasileiou, Steven Furnell Cybersecurity Education for Awareness and Compliance (Hardcover)
Ismini Vasileiou, Steven Furnell
R5,264 Discovery Miles 52 640 Ships in 10 - 15 working days

Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.

Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24,... Information Security Education for Cyber Resilience - 14th IFIP WG 11.8 World Conference, WISE 2021, Virtual Event, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Lynette Drevin, Natalia Miloslavskaya, Wai Sze Leung, Sune Von Solms
R2,620 Discovery Miles 26 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th IFIP WG 11.8 World Conference on Information Security Education, WISE 14, held virtually in June 2021. The 8 papers presented together with a special chapter showcasing the history of WISE and two workshop papers were carefully reviewed and selected from 19 submissions. The papers are organized in the following topical sections: a roadmap for building resilience; innovation in curricula; teaching methods and tools; and end-user security.

Proceeding of International Conference on Computational Science and Applications - ICCSA 2019 (Hardcover, 1st ed. 2020):... Proceeding of International Conference on Computational Science and Applications - ICCSA 2019 (Hardcover, 1st ed. 2020)
Subhash Bhalla, Peter Kwan, Mangesh Bedekar, Rashmi Phalnikar, Sumedha Sirsikar
R5,660 Discovery Miles 56 600 Ships in 10 - 15 working days

The book consists of high-quality papers presented at the International Conference on Computational Science and Applications (ICCSA 2019), held at Maharashtra Institute of Technology World Peace University, Pune, India, from 7 to 9 August 2019. It covers the latest innovations and developments in information and communication technology, discussing topics such as soft computing and intelligent systems, web of sensor networks, drone operating systems, web of sensor networks, wearable smart sensors, automated guided vehicles and many more.

Dictionary of Information Security (Paperback): Robert Slade Dictionary of Information Security (Paperback)
Robert Slade
R701 R569 Discovery Miles 5 690 Save R132 (19%) Ships in 12 - 19 working days

The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.
IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.
* Your one stop shop coverage of malware, wireless technologies, and phishing
*An easy to use tol featuring the ability to cross references makeing navigation easy
* Includes special coverage of military and government terms for the latest hot topics

Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover): Tolga Soyata Enabling Real-Time Mobile Cloud Computing through Emerging Technologies (Hardcover)
Tolga Soyata
R5,302 Discovery Miles 53 020 Ships in 10 - 15 working days

Today's smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand for cell phone applications has necessitated the rise of mobile cloud computing, a technological research arena which combines cloud computing, mobile computing, and wireless networks to maximize the computational and data storage capabilities of mobile devices. Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies. With its exhaustive coverage of emerging techniques, protocols, and computational structures, this reference work is an ideal tool for students, instructors, and researchers in the field of telecommunications. This reference work features astute articles on a wide range of current research topics including, but not limited to, architectural communication components (cloudlets), infrastructural components, secure mobile cloud computing, medical cloud computing, network latency, and emerging open source structures that optimize and accelerate smartphones.

Blockchain Technology and Innovations in Business Processes (Hardcover, 1st ed. 2021): Srikanta Patnaik, Tao-Sheng Wang, Tao... Blockchain Technology and Innovations in Business Processes (Hardcover, 1st ed. 2021)
Srikanta Patnaik, Tao-Sheng Wang, Tao Shen, Sushanta Kumar Panigrahi
R5,104 Discovery Miles 51 040 Ships in 10 - 15 working days

This edited book provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness. The book presents original unpublished research papers on blockchain technology and business management on novel architectures, prototypes and case studies.

Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services... Advances in Wireless Communications and Applications - Wireless Technology: Intelligent Network Technologies, Smart Services and Applications, Proceedings of 3rd ICWCA 2019 (Hardcover, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,365 Discovery Miles 43 650 Ships in 10 - 15 working days

This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.

21st Century Prometheus - Managing CBRN Safety and Security Affected by Cutting-Edge Technologies (Hardcover, 1st ed. 2020):... 21st Century Prometheus - Managing CBRN Safety and Security Affected by Cutting-Edge Technologies (Hardcover, 1st ed. 2020)
Maurizio Martellini, Ralf Trapp
R4,598 Discovery Miles 45 980 Ships in 12 - 19 working days

This book describes the evolving CBRN risk landscape and highlights advances in the "core" CBRN technologies, including when combined with (improvised) explosive devices (CBRNe threats). It analyses how associated technologies create new safety and security risks, challenging certain assumptions that underlie current control regimes. The book also shows how technologies can be enablers for more effective strategies to mitigate these risks. 21st-century safety and security risks emanating from chemical, biological, radiological and nuclear materials - whether resulting from natural events, accidents or malevolent use - are increasingly shaped by technologies that enable their development, production or use in ways that differ from the past. Artificial intelligence, the use of cyberspace, the revolution in the life sciences, new manufacturing methods, new platforms and equipment for agent delivery, hypersonic weapons systems, information tools utilised in hybrid warfare - these and other technologies are reshaping the global security environment and CBRN landscape. They are leading to a growing potential for highly targeted violence, and they can lead to greater instability and vulnerability worldwide. At the same time, technology offers solutions to manage CBRN risks. Examples are faster detection, more accurate characterisation of the nature and origin of CBRN agents, new forensic investigation methods, or new medical treatments for victims of CBRN incidents. New educational concepts help to foster a culture of responsibility in science and technology and strengthen governance. New training methods help develop practical skills to manage CBRN risks more effectively. The book concludes that there is a growing need for a holistic framework towards CBRN risk mitigation. Traditional arms control mechanisms such as global, regional or bilateral treaties and export controls are still needed, as they provide a necessary legal and institutional framework. But laws and technology denial alone will not suffice, and institutional mechanisms can at times be weak. Given the pace of technological progress and the diffusion of critical knowledge, tools and materials, policymakers must accept that CBRN risks cannot be eliminated altogether. Instead, society has to learn to manage these risks and develop resilience against them. This requires a "softer", broadly based multi-stakeholder approach involving governments, industry, the research and development communities, educators, and civil society. Furthermore, educating policymakers that cutting-edge technologies may seriously affect global strategic stability could create incentives for developing a more creative and contemporary arms control strategy that fosters cooperation rather than incremental polarisation.

Artificial Intelligence in China - Proceedings of the International Conference on Artificial Intelligence in China (Hardcover,... Artificial Intelligence in China - Proceedings of the International Conference on Artificial Intelligence in China (Hardcover, 1st ed. 2020)
Qilian Liang, Wei Wang, Jiasong Mu, Xin Liu, Zhenyu Na, …
R9,653 Discovery Miles 96 530 Ships in 10 - 15 working days

This book brings together papers presented at the International Conference on Artificial Intelligence in China (ChinaAI) 2019, which provided a venue for disseminating the latest advances and discussing the interactions and links between the various subfields of AI. Addressing topics that cover virtually all aspects of AI and the latest developments in China, the book is chiefly intended for undergraduate and graduate students in Electrical Engineering, Computer Science, and Mathematics, for researchers and engineers from academia and industry, and for government employees (e.g. at the NSF, DOD, and DOE).

China's e-Science Blue Book 2018 (Hardcover, 1st ed. 2020): Chinese Academy of Sciences, Cyberspace Administration Of... China's e-Science Blue Book 2018 (Hardcover, 1st ed. 2020)
Chinese Academy of Sciences, Cyberspace Administration Of China, Ministry of Education, Ministry Of Science And Technology, Chinese Academy of Social Sciences, …
R2,935 Discovery Miles 29 350 Ships in 10 - 15 working days

This book is jointly compiled by Chinese Academy of Sciences, Cyberspace Administration of China, Ministry of Education of the People's Republic of China, Ministry of Science and Technology of the People's Republic of China, Chinese Academy of Social Sciences, National Natural Science Foundation of China and Chinese Academy of Agricultural Sciences. Over the past several years, Chinese scholars have contributed numerous research works on the development of Chinese scientific information and technology, and produced a range of outstanding achievements. Focusing on the main topic of e-Science, this book explores the forefront of science and technology around the globe, the major demands in China and the main fields in China's economic development. Furthermore, it reviews the major achievements and the typical cases in China's e-Science research. It provides a valuable reference source for future technological innovations and will introduce researchers and students in the area of e-Science to the latest results in China.

Network Security, Administration and Management - Advancing Technology and Practice (Hardcover): Dulal Chandra Kar, Mahbubur... Network Security, Administration and Management - Advancing Technology and Practice (Hardcover)
Dulal Chandra Kar, Mahbubur Rahman Syed
R5,371 Discovery Miles 53 710 Ships in 10 - 15 working days

The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes. Network Security, Administration and Management: Advancing Technology and Practice identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.

Configuring SonicWALL Firewalls (Paperback): Dan Bendell Configuring SonicWALL Firewalls (Paperback)
Dan Bendell
R1,181 Discovery Miles 11 810 Ships in 12 - 19 working days

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years.
This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.
* First book to deliver an in-depth look at the SonicWALL firewall product line
* Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls
* Includes advanced troubleshooting techniques and the SonicWALL Security Manager

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback): J Minella Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise (Paperback)
J Minella
R1,288 R934 Discovery Miles 9 340 Save R354 (27%) Ships in 12 - 19 working days

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security. Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage--including data published for the first time--of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies Effective technical resources and real-world sample architectures Explorations of the relationships between security, wireless, and network elements Practical planning templates, guides, and real-world case studies demonstrating application of the included concepts Perfect for network, wireless, and enterprise security architects, Wireless Security Architecture belongs in the libraries of technical leaders in firms of all sizes and in any industry seeking to build a secure wireless network.

Wireless Networks - From the Physical Layer to Communication, Computing, Sensing and Control (Hardcover): Giorgio... Wireless Networks - From the Physical Layer to Communication, Computing, Sensing and Control (Hardcover)
Giorgio Franceschetti, Sabatino Stornelli
R1,912 Discovery Miles 19 120 Ships in 12 - 19 working days

Awarded by the International Calabria's Prize!
This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and mathematics. As communications technology becomes increasingly wireless, an interdisciplinary viewpoint is necessary for professionals to correct problems and avoid others before they occur.
"Wireless Networks" covers critical technology within WLAN, ad hoc networks, data distribution, TV, radio, and personal mobile devices. As networks become wireless, engineers face increased difficulty securing its malleable boundaries. This book discusses security solutions such as sensor technology that prevent unwanted intrusion. Connectivity is also addressed, featuring chapters on antennas, bandwidth and frequencies. Editors Franceschetti and Stornelli have done a great service to the wireless communications community in creating a compendium that delivers this spectrum of essential information in one reference.
*Presents a uniquely panoramic view of wireless networks with viewpoints from engineering, computing, and mathematics
*The technology is discussed in theory as well as in practice to help engineers design and modify networks
*Globally recognized experts share their critical insight on sensor technology, transfering protocol, ad-hoc networks, and more

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,540 Discovery Miles 15 400
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,420 R1,316 Discovery Miles 13 160
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,539 Discovery Miles 15 390
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,410 Discovery Miles 84 100
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R3,056 Discovery Miles 30 560

 

Partners