0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,634)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Knowledge Management Innovations for Interdisciplinary Education - Organizational Applications (Hardcover, New): Sheryl... Knowledge Management Innovations for Interdisciplinary Education - Organizational Applications (Hardcover, New)
Sheryl Beverley Buckley, Maria Jakovljevic
R4,517 Discovery Miles 45 170 Ships in 18 - 22 working days

Knowledge management innovations provide essential pathways through which teachers, researchers, students, and knowledge management professionals who are interested in understanding and applying knowledge management theory and practice can transfer their insights and experiences into both organizational and educational settings. Knowledge Management Innovations for Interdisciplinary Education: Organizational Applications is a detailed resource on knowledge management and innovations that has been written and edited to provide flexibility and in-depth knowledge management innovations, strategies, and practices. The combination of a primary emphasis on theory and practice with applications to interdisciplinary education, as well as organizational environments, makes this book unique among the burgeoning literature on knowledge management.

Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover): Information R Management Association Research Anthology on Combating Cyber-Aggression and Online Negativity, VOL 1 (Hardcover)
Information R Management Association
R11,895 Discovery Miles 118 950 Ships in 18 - 22 working days
AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover): Documentation Team AWS Identity and Access Management User Guide - AWS IAM User Guide (Hardcover)
Documentation Team
R2,376 R1,953 Discovery Miles 19 530 Save R423 (18%) Ships in 18 - 22 working days
Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019): Amit Kumar Singh, Anand... Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019)
Amit Kumar Singh, Anand Mohan
R6,633 Discovery Miles 66 330 Ships in 10 - 15 working days

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

HP NonStop Server Security - A Practical Handbook (Paperback): XYPRO Technology Corp HP NonStop Server Security - A Practical Handbook (Paperback)
XYPRO Technology Corp
R2,760 R2,599 Discovery Miles 25 990 Save R161 (6%) Ships in 10 - 15 working days

Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook is a source for critical information to NonStop professionals and NonStop security administrators in particular. However, it is written in such a way as to also be extremely useful to readers new to the NonStop platform and to information security.
This handbook familiarizes auditors and those responsible for security configuration and monitoring with the aspects of the HP NonStop server operating system that make the NonStop Server unique, the security risks these aspects create, and the best ways to mitigate these risks.
.Addresses the lack of security standards for the NonStop server
.Provides information robust enough to train more security-knowledgeable staff
.The ideal accompaniment to any new HP NonStop system"

Communication Networking - An Analytical Approach (Hardcover): Anurag Kumar, D Manjunath, Joy Kuri Communication Networking - An Analytical Approach (Hardcover)
Anurag Kumar, D Manjunath, Joy Kuri
R2,269 Discovery Miles 22 690 Ships in 10 - 15 working days

Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art network-one that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing. The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary. This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.

Comparison-shopping Services and Agent Designs (Hardcover): Wang Yun Comparison-shopping Services and Agent Designs (Hardcover)
Wang Yun
R4,953 Discovery Miles 49 530 Ships in 18 - 22 working days

Popular among online shoppers, comparison-shopping provides a new sales channel for small to medium enterprises to contend with brand name vendors. ""Comparison-Shopping Services and Agent Designs"" provides a collection of comprehensive research articles on the latest technologies involved with online consumer services. This ""Premier Reference Source"" provides e-commerce and agent technology researchers, academicians, and practitioners with a useful overview as well as references to the latest advancements in the field.

Voice, Video, and Data Network Convergence - Architecture and Design, From VoIP to Wireless (Paperback): Juanita Ellis, Joy... Voice, Video, and Data Network Convergence - Architecture and Design, From VoIP to Wireless (Paperback)
Juanita Ellis, Joy Rahman, Charles Pursell
R1,809 Discovery Miles 18 090 Ships in 10 - 15 working days

*Covers the latest standards and those being developed in an ever-evolving field
*Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
*Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions
A recent survey of 500 U.S. companies with multiple locations found that 81% are planning to implement IP Telephony on their local area networks (LANs) in 2003, and two-thirds are looking at convergence for their wide area networks (WANs) as well. This includes voice, video and data over hard line and wireless networks.
Today, new standards and technologies are being developed to support convergence and voice over IP (VoIP) and Video over IP and wireless. Because convergence covers the voice and data world, it will be critical to understand all of these environments.
This book provides detailed information on convergence network models, protocol stacks, routing algorithms, gateways and switches required to support these networks.
*Covers the latest standards and those being developed in an ever-evolving field
*Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
*Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions

Research Anthology on Securing Medical Systems and Records, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 1 (Hardcover)
Information R Management Association
R11,321 Discovery Miles 113 210 Ships in 18 - 22 working days
Emerging Automation Techniques for the Future Internet (Hardcover): Mohamed Boucadair, Christian Jacquenet Emerging Automation Techniques for the Future Internet (Hardcover)
Mohamed Boucadair, Christian Jacquenet
R4,904 Discovery Miles 49 040 Ships in 18 - 22 working days

Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services. Emerging Automation Techniques for the Future Internet is a collection of innovative research on the methods and applications of new architectures for the planning, dynamic delivery, and operation of services with a particular focus on automated detection and mitigation of denial-of-service (DoS) attacks. While highlighting topics including policy enforcement, self-architectures, and automated networks, this book is ideally designed for engineers, IT consultants, professionals, researchers, academicians, and students seeking current research on techniques and structures used to enhance experience and services rendered.

Securing E-Business Systems - A Guide for Managers & Executives (Hardcover): T Braithwaite Securing E-Business Systems - A Guide for Managers & Executives (Hardcover)
T Braithwaite
R1,011 R864 Discovery Miles 8 640 Save R147 (15%) Ships in 18 - 22 working days

"This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nation’s enemies. We may secure the airways, ports, and borders, but only the boardrooms of America can ensure the survival of our economy." –John R. Thomas, Colonel, U.S. Army, Retired, Former Commander of the DoD, Global Operations and Security Center

Today’s e-business depends on the security of its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex than ever. Securing E-Business Systems offers a new model for developing a proactive program of security administration that works as a continuous process of identifying weaknesses and implementing solutions. This book offers a real, working design for managing an IT security program with the attention it truly warrants, treating security as a constant function that adapts to meet a company’s changing security needs.

Topics include:

  • Security weaknesses
  • Safeguarding technologies
  • Countermeasure best practices
  • Establishing an adaptable e-business security management program
  • Essential elements of a corporate security management program
  • Functions, structure, staffing, and contracting considerations in security management
  • Implementing intrusion detection technology
  • Designing tomorrow’s e-business application for secured operations
  • Contemporary rationales for justifying increased spending on security programs
  • Emerging liability issues for e-businesses
Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover): W Puech Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover)
W Puech
R3,771 Discovery Miles 37 710 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,167 Discovery Miles 71 670 Ships in 18 - 22 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,169 R2,871 Discovery Miles 28 710 Save R298 (9%) Ships in 18 - 22 working days
Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,177 Discovery Miles 41 770 Ships in 18 - 22 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

MPLS Network Management - MIBs, Tools, and Techniques (Hardcover): Thomas D Nadeau MPLS Network Management - MIBs, Tools, and Techniques (Hardcover)
Thomas D Nadeau
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

MPLS-enabled networks are enjoying tremendous growth, but practical information on managing MPLS-enabled networks has remained hard to find. Until now.
MPLS Network Management: MIBs, Tools, and Techniques is the first and only book that will help you master MPLS management technologies and techniques, as they apply to classic MPLS networks, traffic-engineered networks, and VPNs. Written by the co-author of most current MPLS management standards, it provides detailed, authoritative coverage of official MIBs, examining key topics ranging from syntax to access levels to object interaction. It also offers extensive consideration of third-party management interfaces, including tools for metering traffic and predicting traffic growth and behavior. If you're a network operator, network device engineer, or MPLS application developer, you need this book to get all you can out of all of MPLS's many capabilities.
* The only book devoted entirely to the tools and techniques for controlling, monitoring, debugging, and optimizing MPLS-enabled networks.
* Authoritative information from the co-author of most IETF MIBs relating to MPLS and GMPLS, PWE3, and PPVPN.
* Covers both standards-based and proprietary management technologies.
* Includes interviews with seminal figures in the development of MPLS.
* Via a companion web site, provides information on late-breaking developments in MPLS management and links to additional resources.
* To be followed by a second volume presenting best-practice case studies dealing with how real companies approach the management of their MPLS networks.

Developing Interoperable and Federated Cloud Architecture (Hardcover): Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth Developing Interoperable and Federated Cloud Architecture (Hardcover)
Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage.

From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R3,801 Discovery Miles 38 010 Ships in 18 - 22 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Twitter (Hardcover, 2nd Edition): D. Murthy Twitter (Hardcover, 2nd Edition)
D. Murthy
R1,818 Discovery Miles 18 180 Ships in 18 - 22 working days

Twitter is a household name, discussed for its role in national elections, natural disasters, and political movements, as well as for what some malign as narcissistic chatter. The first edition of Murthy s balanced and incisive book pioneered the study of this medium as a serious platform worthy of scholarly attention. Much has changed since Twitter s infancy, although it is more relevant than ever to our social, political, and economic lives. This timely second edition shows how Twitter has evolved and how it is used today. Murthy introduces some of the historical context that gave birth to the platform, while providing up-to-date examples such as the #blacklivesmatter movement, and Donald Trump s use of Twitter in the US election. The chapters on journalism and social movements have been thoroughly updated, and completely new to this edition is a chapter on celebrities and brands. Seeking to answer challenging questions around the popular medium, the second edition of Twitter is essential reading for students and scholars of digital media.

Big Data Science & Analytics - A Hands-On Approach (Hardcover): Arshdeep Bahga, Vijay Madisetti Big Data Science & Analytics - A Hands-On Approach (Hardcover)
Arshdeep Bahga, Vijay Madisetti
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days
Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019): Christoforos Kachris, Babak Falsafi, Dimitrios Soudris Hardware Accelerators in Data Centers (Hardcover, 1st ed. 2019)
Christoforos Kachris, Babak Falsafi, Dimitrios Soudris
R3,812 Discovery Miles 38 120 Ships in 18 - 22 working days

This book provides readers with an overview of the architectures, programming frameworks, and hardware accelerators for typical cloud computing applications in data centers. The authors present the most recent and promising solutions, using hardware accelerators to provide high throughput, reduced latency and higher energy efficiency compared to current servers based on commodity processors. Readers will benefit from state-of-the-art information regarding application requirements in contemporary data centers, computational complexity of typical tasks in cloud computing, and a programming framework for the efficient utilization of the hardware accelerators.

Information Security: Principles and Practices (Hardcover): Miles Carr Information Security: Principles and Practices (Hardcover)
Miles Carr
R2,864 R2,604 Discovery Miles 26 040 Save R260 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
High Performance Computing on Vector…
Thomas Boenisch, Sunil Tiyyagura, … Hardcover R2,655 Discovery Miles 26 550
Heterogeneity, High Performance…
Theo Lynn, John P. Morrison, … Hardcover R902 Discovery Miles 9 020
Artificial Intelligence for Capital…
Syed Hasan Jafar, Hemachandran K, … Hardcover R3,294 Discovery Miles 32 940
Artificial Intelligence (AI) - Recent…
S. Kanimozhi Suguna, M. Dhivya, … Hardcover R5,076 Discovery Miles 50 760
Workshop on High Performance Computing…
G. Cooperman, G. Michler, … Paperback R1,395 Discovery Miles 13 950
Software Engineering for Science
Jeffrey C. Carver, Neil P. Chue Hong, … Paperback R1,477 Discovery Miles 14 770
Supercomputers - A Key to U.S…
J.R. Kirkland, J.H. Poore Hardcover R2,806 R2,540 Discovery Miles 25 400
High Performance Embedded Computing…
David R Martinez Hardcover R1,306 Discovery Miles 13 060
Conquering Big Data with High…
Ritu Arora Hardcover R5,057 Discovery Miles 50 570
Elements of Parallel Computing
Eric Aubanel Hardcover R5,769 Discovery Miles 57 690

 

Partners