0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (270)
  • R250 - R500 (875)
  • R500+ (13,567)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cable Networks, Services, and Management (Hardcover): M Toy Cable Networks, Services, and Management (Hardcover)
M Toy
R3,354 Discovery Miles 33 540 Ships in 18 - 22 working days

This is the first book describing cable networks, services, and their management in greater detail by thirteen experts in various fields covering network architectures and services, operations, administration, maintenance, provisioning, troubleshooting (OAMPT) for residential services; network architectures, services, and OAMPT for business services; Software Defined Networks (SDN) and Virtualization concepts Comprehensive reference book useful for people working for a multiple systems operator Includes chapter introductions Written by 13 experts in various fields such as network services and soft defined networks

Fourth-Generation Wireless Networks - Applications and Innovations (Hardcover, New): Fourth-Generation Wireless Networks - Applications and Innovations (Hardcover, New)
R4,781 Discovery Miles 47 810 Ships in 18 - 22 working days

Fourth generation wireless networks are expected to provide comprehensive and secure IP-based solutions, facilitating existing and emerging services such as voice, data, streamed multimedia, sensory, e-health, and social networking. It is expected that 4G will be provided to users on an "Anytime, Anywhere" basis and at much higher data rates compared to the current and previous mobile generations. Fourth-Generation Wireless Networks: Applications and Innovations presents a vision for the coming years in terms of emerging fourth generation (4G) wireless technology trends and best practices. It explores the resulting challenges and technical opportunities that will arise in creating and delivering 4G networks for the emerging applications and services. This book also examines the fundamentals of advanced physical layer and radio resource management as the basis for cross layer and cross network optimization that will emerge for increased mobility and services in video, cloud computing virtualization, entertainment, education, health, and security. This book have been organized especially for researchers, students, network engineers and designers and leaders of emerging companies, decision makers in standards, consumers, and product developers.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 2 (Hardcover)
Information R Management Association
R11,899 Discovery Miles 118 990 Ships in 18 - 22 working days
Game Theory Solutions for the Internet of Things - Emerging Research and Opportunities (Hardcover): Sung-Wook Kim Game Theory Solutions for the Internet of Things - Emerging Research and Opportunities (Hardcover)
Sung-Wook Kim
R3,302 Discovery Miles 33 020 Ships in 18 - 22 working days

There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications.

Cybersecurity Measures for E-Government Frameworks (Hardcover): Noor Zaman, Imdad Ali Shah, Samina Rajper Cybersecurity Measures for E-Government Frameworks (Hardcover)
Noor Zaman, Imdad Ali Shah, Samina Rajper
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.

Trust in a Complex World - Enriching Community (Hardcover): Charles Heckscher Trust in a Complex World - Enriching Community (Hardcover)
Charles Heckscher
R1,081 Discovery Miles 10 810 Ships in 10 - 15 working days

Can we rebuild trust in a time of increasing conflict and paralysis? Or rather, can we build trust, for the first time, wide and strong enough to bring us together to work on the complex problems of our age? Relations of trust have been weakened over the past century by a historic expansion of communication and cross-cultural interaction, and the advance of complex, fluid relationships. Now the rapid rise of the internet has accelerated the disruption. Many long for the comfort and security of relations in which one knew whom to trust and what to expect; yet at the same time they may embrace the dynamism and creativity that comes from mixing of cultures and perspectives. This book explores current conflicts and confusions of relations and identities, using both general theory and specific cases. It argues that we are at a catalyzing moment in a long transition from a community in which the prime rule was tolerance, to one with a commitment to understanding; from one where it was considered wrong to argue about cultural differences, to one where such arguments are essential. The development of this rich community is essential as well as difficult. Complex societies produce complex challenges, from climate change to inequality to the risk-laden opportunities of bioengineering, that demand collaboration among people with widely varying views. Such brewing crises cannot be worked through without far more deliberate discussion and cooperation, and higher levels of trust, than we have today. This book explores many challenges ahead and suggests some practical directions for resolving them.

Computer and Information Science (Hardcover, 1st ed. 2019): Roger Lee Computer and Information Science (Hardcover, 1st ed. 2019)
Roger Lee
R3,795 Discovery Miles 37 950 Ships in 18 - 22 working days

This book presents the outcomes of the 17th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2018), which was held in Singapore on June 6-8, 2018. The aim of the conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences, and to exchange new ideas and information in a meaningful way. The book includes findings on all aspects (theory, applications and tools) of computer and information science and discusses related practical challenges and the solutions adopted to solve them. The conference organizers selected the best papers from those accepted for presentation. The papers were chosen based on review scores submitted by members of the program committee and underwent a further rigorous round of review. From this second round, 13 of the conference's most promising papers were then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will make to the field of computer and information science.

AWS Snowball Developer Guide (Hardcover): Documentation Team AWS Snowball Developer Guide (Hardcover)
Documentation Team
R2,125 R1,701 Discovery Miles 17 010 Save R424 (20%) Ships in 18 - 22 working days
Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,625 Discovery Miles 36 250 Ships in 10 - 15 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover): Puech Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover)
Puech
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.

Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover): Jean-Loup Richet Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover)
Jean-Loup Richet
R6,085 Discovery Miles 60 850 Ships in 18 - 22 working days

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover): Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover)
R4,672 Discovery Miles 46 720 Ships in 18 - 22 working days

Wireless networking is considered by many to be the future of communication technology, as the demand for high quality, mobile connection increases across the world. Wireless Network Traffic and Quality of Service Support: Trends and Standards examines cutting edge approaches for the provision of Quality of Service (QoS) in wireless local area networks, presenting the latest solutions towards the optimization of the channel management and routing in infrastructure and ad hoc wireless networks. This book also analyzes traffic categorization issues and methods that can predict the available QoS, as well as managing wireless mesh networks and wireless sensor networks. It also examines the entire user experience, by treating energy conservation techniques to maximize mobile devices' battery lifetime. It is a vital foundation for researchers dealing with the problems of today to create the new networks of the future.

Java Card E-Payment Application Development (Hardcover): Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller Java Card E-Payment Application Development (Hardcover)
Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller
R2,113 Discovery Miles 21 130 Ships in 18 - 22 working days

Java Card is one of the latest developments in the area of multi-application and platform-independent smart cards. As a working tool for professionals, this easy-to-understand resource provides clear, detailed guidance on smart cards, credit and debit cards, Java Card and Open Card Framework (OCF). It offers in-depth coverage of important standards, open specifications and critical security issues, including common threats and security mechanisms regarding the card and its connection interface. The book explains how to program a Java Card applet, an OCF card service and a terminal application. What's more, the book presents an informative case study on the credit-debit application, offering a detailed road map of the application development process.

Communications and Computer Networks (Hardcover): Akira Hanako Communications and Computer Networks (Hardcover)
Akira Hanako
R3,249 R2,944 Discovery Miles 29 440 Save R305 (9%) Ships in 18 - 22 working days
Recent Advances in Cryptography and Network Security (Hardcover): Pinaki Mitra Recent Advances in Cryptography and Network Security (Hardcover)
Pinaki Mitra
R2,550 Discovery Miles 25 500 Ships in 18 - 22 working days
Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover): Suhasini Verma, Vidhisha Vyas, Keshav Kaushik Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover)
Suhasini Verma, Vidhisha Vyas, Keshav Kaushik
R7,314 Discovery Miles 73 140 Ships in 18 - 22 working days

Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover): Ganesh Chandra Deka, Sambit... Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover)
Ganesh Chandra Deka, Sambit Bakshi
R8,370 Discovery Miles 83 700 Ships in 18 - 22 working days

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Services Computing for Language Resources (Hardcover, 1st ed. 2018): Yohei Murakami, Donghui Lin, Toru Ishida Services Computing for Language Resources (Hardcover, 1st ed. 2018)
Yohei Murakami, Donghui Lin, Toru Ishida
R2,647 R1,881 Discovery Miles 18 810 Save R766 (29%) Ships in 10 - 15 working days

Describing the technologies to combine language resources flexibly as web services, this book provides valuable case studies for those who work in services computing, language resources, human-computer interaction (HCI), computer-supported cooperative work (CSCW), and service science. The authors have been operating the Language Grid, which wraps existing language resources as atomic language services and enables users to compose new services by combining them. From architecture level to service composition level, the book explains how to resolve infrastructural and operational difficulties in sharing and combining language resources, including interoperability of language service infrastructures, various types of language service policies, human services, and service failures.The research based on the authors' operating experiences of handling complicated issues such as intellectual property and interoperability of language resources contributes to exploitation of language resources as a service. On the other hand, both the analysis based on using services and the design of new services can bring significant results. A new style of multilingual communication supported by language services is worthy of analysis in HCI/CSCW, and the design process of language services is the focus of valuable case studies in service science. By using language resources in different ways based on the Language Grid, many activities are highly regarded by diverse communities. This book consists of four parts: (1) two types of language service platforms to interconnect language services across service grids, (2) various language service composition technologies that improve the reusability, efficiency, and accuracy of composite services, (3) research work and activities in creating language resources and services, and (4) various applications and tools for understanding and designing language services that well support intercultural collaboration.

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R4,910 Discovery Miles 49 100 Ships in 18 - 22 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Wireless Sensor Networks (Hardcover): Kevin Merriman Wireless Sensor Networks (Hardcover)
Kevin Merriman
R3,243 R2,938 Discovery Miles 29 380 Save R305 (9%) Ships in 18 - 22 working days
CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,357 Discovery Miles 13 570 Ships in 10 - 15 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

Networking in the Internet Age (Hardcover): A. Dennis Networking in the Internet Age (Hardcover)
A. Dennis
R6,274 Discovery Miles 62 740 Ships in 18 - 22 working days

This text is appropriate for those courses with an emphasis on e-commerce and the Internet, as well as short courses or MBA/IS courses that want a modern approach. Networking has changed dramatically over the past ten years. Most texts have focused on network layers and their concepts and then on how the different technologies are implemented; however with the number of viable technologies shrinking, it makes less sense to focus on concepts first and technologies second. Networking in the Internet Age first edition integrates the discussion of concepts and technologies so they appear in one place, organized by layers.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

AWS Greengrass Developer Guide (Hardcover): Documentation Team AWS Greengrass Developer Guide (Hardcover)
Documentation Team
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days
WLAN Systems and Wireless IP for Next Generation Communications (Hardcover): Neeli Prasad, Anand Prasad WLAN Systems and Wireless IP for Next Generation Communications (Hardcover)
Neeli Prasad, Anand Prasad
R3,165 Discovery Miles 31 650 Ships in 18 - 22 working days

The continuing growth of wireless networks is being driven by ease of installation, flexibility and mobility, offering gains in efficiency, accuracy and lower business costs. This fresh perspective from two experts in the field provides professionals with a practical approach to design implementation, evaluation and problem-solving, which underscores its uniqueness as a hands-on guide to next generation wireless communications systems. The book offers practitioners a wealth of information on WLAN (wireless local area network) implementation, deployment and results. Key topics include: IP networking for wireless; wireless networking and Internet access standards; changes in the IEEE 802.11 standard; system design and implementation; and performance analysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Murder in the Mountains and other…
Carol Reeve Paperback R271 Discovery Miles 2 710
Table For Two
Amor Towles Paperback R447 Discovery Miles 4 470
Normal Rules Don't Apply - Short Stories
Kate Atkinson Paperback R380 R300 Discovery Miles 3 000
The Family Izquierdo - A Novel
Ruben Degollado Paperback R391 R367 Discovery Miles 3 670
Ver In Die Wereld
Frederik de Jager Paperback R360 R321 Discovery Miles 3 210
Scardio the Seahorse
Hannah Henderson Paperback R645 Discovery Miles 6 450
A Case of the Claws
Catherine Aird Hardcover R251 Discovery Miles 2 510
Moving On - Short Stories
Barbara Ludman Paperback R280 R259 Discovery Miles 2 590
Joburg Noir
Niq Mhlongo Paperback  (2)
R325 Discovery Miles 3 250
Intruders
Mohale Mashigo Paperback  (1)
R250 R227 Discovery Miles 2 270

 

Partners