0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (251)
  • R250 - R500 (861)
  • R500+ (13,637)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cybersecurity Measures for E-Government Frameworks (Hardcover): Noor Zaman, Imdad Ali Shah, Samina Rajper Cybersecurity Measures for E-Government Frameworks (Hardcover)
Noor Zaman, Imdad Ali Shah, Samina Rajper
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

E-governance is an application of IT; holding uses for the delivery of Government services, information exchange between Government to public, e-business, and various. However, the aim of cybersecurity is to provide security from cyber-attacks from the view of emerging technology is used by hackers. Hence, it is important to provide fast protection application software and structure. In this scenario, the government may be focused to provide capable Internet carefully without the risk of fraud. These days the study deliberates about the issue of the world while technology is helping and fruitful on each step of life like e-Governance applications. Though, has been limited study has been done by a previous study on protocols of cybersecurity for e-Governance.

Trust in a Complex World - Enriching Community (Hardcover): Charles Heckscher Trust in a Complex World - Enriching Community (Hardcover)
Charles Heckscher
R1,081 Discovery Miles 10 810 Ships in 10 - 15 working days

Can we rebuild trust in a time of increasing conflict and paralysis? Or rather, can we build trust, for the first time, wide and strong enough to bring us together to work on the complex problems of our age? Relations of trust have been weakened over the past century by a historic expansion of communication and cross-cultural interaction, and the advance of complex, fluid relationships. Now the rapid rise of the internet has accelerated the disruption. Many long for the comfort and security of relations in which one knew whom to trust and what to expect; yet at the same time they may embrace the dynamism and creativity that comes from mixing of cultures and perspectives. This book explores current conflicts and confusions of relations and identities, using both general theory and specific cases. It argues that we are at a catalyzing moment in a long transition from a community in which the prime rule was tolerance, to one with a commitment to understanding; from one where it was considered wrong to argue about cultural differences, to one where such arguments are essential. The development of this rich community is essential as well as difficult. Complex societies produce complex challenges, from climate change to inequality to the risk-laden opportunities of bioengineering, that demand collaboration among people with widely varying views. Such brewing crises cannot be worked through without far more deliberate discussion and cooperation, and higher levels of trust, than we have today. This book explores many challenges ahead and suggests some practical directions for resolving them.

Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover): Jean-Loup Richet Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover)
Jean-Loup Richet
R6,085 Discovery Miles 60 850 Ships in 18 - 22 working days

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,169 R2,871 Discovery Miles 28 710 Save R298 (9%) Ships in 18 - 22 working days
Communications and Computer Networks (Hardcover): Akira Hanako Communications and Computer Networks (Hardcover)
Akira Hanako
R3,249 R2,944 Discovery Miles 29 440 Save R305 (9%) Ships in 18 - 22 working days
AWS Snowball Developer Guide (Hardcover): Documentation Team AWS Snowball Developer Guide (Hardcover)
Documentation Team
R2,125 R1,701 Discovery Miles 17 010 Save R424 (20%) Ships in 18 - 22 working days
Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,625 Discovery Miles 36 250 Ships in 10 - 15 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks (Hardcover): Biswa Mohan... Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks (Hardcover)
Biswa Mohan Sahoo, Suman Avdhesh Yadav
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,167 Discovery Miles 71 670 Ships in 18 - 22 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R3,801 Discovery Miles 38 010 Ships in 18 - 22 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Developing Interoperable and Federated Cloud Architecture (Hardcover): Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth Developing Interoperable and Federated Cloud Architecture (Hardcover)
Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage.

Networking in the Internet Age (Hardcover): A. Dennis Networking in the Internet Age (Hardcover)
A. Dennis
R6,274 Discovery Miles 62 740 Ships in 18 - 22 working days

This text is appropriate for those courses with an emphasis on e-commerce and the Internet, as well as short courses or MBA/IS courses that want a modern approach. Networking has changed dramatically over the past ten years. Most texts have focused on network layers and their concepts and then on how the different technologies are implemented; however with the number of viable technologies shrinking, it makes less sense to focus on concepts first and technologies second. Networking in the Internet Age first edition integrates the discussion of concepts and technologies so they appear in one place, organized by layers.

Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover): Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover)
R4,672 Discovery Miles 46 720 Ships in 18 - 22 working days

Wireless networking is considered by many to be the future of communication technology, as the demand for high quality, mobile connection increases across the world. Wireless Network Traffic and Quality of Service Support: Trends and Standards examines cutting edge approaches for the provision of Quality of Service (QoS) in wireless local area networks, presenting the latest solutions towards the optimization of the channel management and routing in infrastructure and ad hoc wireless networks. This book also analyzes traffic categorization issues and methods that can predict the available QoS, as well as managing wireless mesh networks and wireless sensor networks. It also examines the entire user experience, by treating energy conservation techniques to maximize mobile devices' battery lifetime. It is a vital foundation for researchers dealing with the problems of today to create the new networks of the future.

Java Card E-Payment Application Development (Hardcover): Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller Java Card E-Payment Application Development (Hardcover)
Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller
R2,113 Discovery Miles 21 130 Ships in 18 - 22 working days

Java Card is one of the latest developments in the area of multi-application and platform-independent smart cards. As a working tool for professionals, this easy-to-understand resource provides clear, detailed guidance on smart cards, credit and debit cards, Java Card and Open Card Framework (OCF). It offers in-depth coverage of important standards, open specifications and critical security issues, including common threats and security mechanisms regarding the card and its connection interface. The book explains how to program a Java Card applet, an OCF card service and a terminal application. What's more, the book presents an informative case study on the credit-debit application, offering a detailed road map of the application development process.

Recent Advances in Cryptography and Network Security (Hardcover): Pinaki Mitra Recent Advances in Cryptography and Network Security (Hardcover)
Pinaki Mitra
R2,550 Discovery Miles 25 500 Ships in 18 - 22 working days
Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019): Christoforos Kachris, Babak Falsafi, Dimitrios Soudris Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019)
Christoforos Kachris, Babak Falsafi, Dimitrios Soudris
R3,812 Discovery Miles 38 120 Ships in 18 - 22 working days

This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.

Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover): Puech Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover)
Puech
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.

Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover): Suhasini Verma, Vidhisha Vyas, Keshav Kaushik Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover)
Suhasini Verma, Vidhisha Vyas, Keshav Kaushik
R7,314 Discovery Miles 73 140 Ships in 18 - 22 working days

Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover): Ganesh Chandra Deka, Sambit... Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover)
Ganesh Chandra Deka, Sambit Bakshi
R8,370 Discovery Miles 83 700 Ships in 18 - 22 working days

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Services Computing for Language Resources (Hardcover, 1st ed. 2018): Yohei Murakami, Donghui Lin, Toru Ishida Services Computing for Language Resources (Hardcover, 1st ed. 2018)
Yohei Murakami, Donghui Lin, Toru Ishida
R2,647 R1,881 Discovery Miles 18 810 Save R766 (29%) Ships in 10 - 15 working days

Describing the technologies to combine language resources flexibly as web services, this book provides valuable case studies for those who work in services computing, language resources, human-computer interaction (HCI), computer-supported cooperative work (CSCW), and service science. The authors have been operating the Language Grid, which wraps existing language resources as atomic language services and enables users to compose new services by combining them. From architecture level to service composition level, the book explains how to resolve infrastructural and operational difficulties in sharing and combining language resources, including interoperability of language service infrastructures, various types of language service policies, human services, and service failures.The research based on the authors' operating experiences of handling complicated issues such as intellectual property and interoperability of language resources contributes to exploitation of language resources as a service. On the other hand, both the analysis based on using services and the design of new services can bring significant results. A new style of multilingual communication supported by language services is worthy of analysis in HCI/CSCW, and the design process of language services is the focus of valuable case studies in service science. By using language resources in different ways based on the Language Grid, many activities are highly regarded by diverse communities. This book consists of four parts: (1) two types of language service platforms to interconnect language services across service grids, (2) various language service composition technologies that improve the reusability, efficiency, and accuracy of composite services, (3) research work and activities in creating language resources and services, and (4) various applications and tools for understanding and designing language services that well support intercultural collaboration.

Wireless Sensor Networks (Hardcover): Kevin Merriman Wireless Sensor Networks (Hardcover)
Kevin Merriman
R3,243 R2,938 Discovery Miles 29 380 Save R305 (9%) Ships in 18 - 22 working days
Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover): W Puech Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover)
W Puech
R3,771 Discovery Miles 37 710 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R4,910 Discovery Miles 49 100 Ships in 18 - 22 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

AWS Greengrass Developer Guide (Hardcover): Documentation Team AWS Greengrass Developer Guide (Hardcover)
Documentation Team
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl Hardcover R9,276 Discovery Miles 92 760
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770

 

Partners