0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,586)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

AWS Snowball Developer Guide (Hardcover): Documentation Team AWS Snowball Developer Guide (Hardcover)
Documentation Team
R2,125 R1,701 Discovery Miles 17 010 Save R424 (20%) Ships in 18 - 22 working days
AWS Certified Advanced Networking Specialty Exam Practice Questions - 350+ Exam Questions (Paperback): Ip Specialist AWS Certified Advanced Networking Specialty Exam Practice Questions - 350+ Exam Questions (Paperback)
Ip Specialist
R481 Discovery Miles 4 810 Ships in 10 - 15 working days
Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover): Puech Multimedia Security Volume 2: Biometrics, Video Su rveillance and Multimedia Encryption (Hardcover)
Puech
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.

Information Systems and Technology for Organizations in a Networked Society (Hardcover, New): Tomayess Issa, Pedro Isaias, Piet... Information Systems and Technology for Organizations in a Networked Society (Hardcover, New)
Tomayess Issa, Pedro Isaias, Piet Kommers
R4,735 Discovery Miles 47 350 Ships in 18 - 22 working days

Modern society is increasingly information-driven, relying heavily on Information Systems (IS) and Information Technology (IT). Business enterprises are no exception, and managers and leaders must learn to make the most of the information resources at their disposal or risk falling behind the times. Information Systems and Technology for Organizations in a Networked Society discusses methods of using information technologies to support organizational and business objectives in both national and international contexts. This reference book describes the latest research on both the technical and non-technical aspects of contemporary information societies, including e-commerce, e-learning, e-government, and e-health; supporting professionals and academicians in developing a deeper understanding of the most effective models for communication, collaboration, and business development. This book is part of the Advances in Business Information Systems and Analytics series collection.

Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover): Jean-Loup Richet Cybersecurity Policies and Strategies for Cyberwarfare Prevention (Hardcover)
Jean-Loup Richet
R6,085 Discovery Miles 60 850 Ships in 18 - 22 working days

Cybersecurity has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cybersecurity Policies and Strategies for Cyberwarfare Prevention serves as an integral publication on the latest legal and defensive measures being implemented to protect individuals, as well as organizations, from cyber threats. Examining online criminal networks and threats in both the public and private spheres, this book is a necessary addition to the reference collections of IT specialists, administrators, business managers, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover): Wireless Network Traffic and Quality of Service Support - Trends and Standards (Hardcover)
R4,672 Discovery Miles 46 720 Ships in 18 - 22 working days

Wireless networking is considered by many to be the future of communication technology, as the demand for high quality, mobile connection increases across the world. Wireless Network Traffic and Quality of Service Support: Trends and Standards examines cutting edge approaches for the provision of Quality of Service (QoS) in wireless local area networks, presenting the latest solutions towards the optimization of the channel management and routing in infrastructure and ad hoc wireless networks. This book also analyzes traffic categorization issues and methods that can predict the available QoS, as well as managing wireless mesh networks and wireless sensor networks. It also examines the entire user experience, by treating energy conservation techniques to maximize mobile devices' battery lifetime. It is a vital foundation for researchers dealing with the problems of today to create the new networks of the future.

Java Card E-Payment Application Development (Hardcover): Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller Java Card E-Payment Application Development (Hardcover)
Vesna Hassler, Etc, Mikhail Gordeev, Martin Manninger, Christoph Muller
R2,113 Discovery Miles 21 130 Ships in 18 - 22 working days

Java Card is one of the latest developments in the area of multi-application and platform-independent smart cards. As a working tool for professionals, this easy-to-understand resource provides clear, detailed guidance on smart cards, credit and debit cards, Java Card and Open Card Framework (OCF). It offers in-depth coverage of important standards, open specifications and critical security issues, including common threats and security mechanisms regarding the card and its connection interface. The book explains how to program a Java Card applet, an OCF card service and a terminal application. What's more, the book presents an informative case study on the credit-debit application, offering a detailed road map of the application development process.

Communications and Computer Networks (Hardcover): Akira Hanako Communications and Computer Networks (Hardcover)
Akira Hanako
R3,249 R2,944 Discovery Miles 29 440 Save R305 (9%) Ships in 18 - 22 working days
Recent Advances in Cryptography and Network Security (Hardcover): Pinaki Mitra Recent Advances in Cryptography and Network Security (Hardcover)
Pinaki Mitra
R2,550 Discovery Miles 25 500 Ships in 18 - 22 working days
Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R2,941 Discovery Miles 29 410 Ships in 18 - 22 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Services Computing for Language Resources (Hardcover, 1st ed. 2018): Yohei Murakami, Donghui Lin, Toru Ishida Services Computing for Language Resources (Hardcover, 1st ed. 2018)
Yohei Murakami, Donghui Lin, Toru Ishida
R2,647 R1,881 Discovery Miles 18 810 Save R766 (29%) Ships in 10 - 15 working days

Describing the technologies to combine language resources flexibly as web services, this book provides valuable case studies for those who work in services computing, language resources, human-computer interaction (HCI), computer-supported cooperative work (CSCW), and service science. The authors have been operating the Language Grid, which wraps existing language resources as atomic language services and enables users to compose new services by combining them. From architecture level to service composition level, the book explains how to resolve infrastructural and operational difficulties in sharing and combining language resources, including interoperability of language service infrastructures, various types of language service policies, human services, and service failures.The research based on the authors' operating experiences of handling complicated issues such as intellectual property and interoperability of language resources contributes to exploitation of language resources as a service. On the other hand, both the analysis based on using services and the design of new services can bring significant results. A new style of multilingual communication supported by language services is worthy of analysis in HCI/CSCW, and the design process of language services is the focus of valuable case studies in service science. By using language resources in different ways based on the Language Grid, many activities are highly regarded by diverse communities. This book consists of four parts: (1) two types of language service platforms to interconnect language services across service grids, (2) various language service composition technologies that improve the reusability, efficiency, and accuracy of composite services, (3) research work and activities in creating language resources and services, and (4) various applications and tools for understanding and designing language services that well support intercultural collaboration.

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R4,910 Discovery Miles 49 100 Ships in 18 - 22 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,285 Discovery Miles 12 850 Ships in 10 - 15 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Wireless Sensor Networks (Hardcover): Kevin Merriman Wireless Sensor Networks (Hardcover)
Kevin Merriman
R3,243 R2,938 Discovery Miles 29 380 Save R305 (9%) Ships in 18 - 22 working days
Networking in the Internet Age (Hardcover): A. Dennis Networking in the Internet Age (Hardcover)
A. Dennis
R6,274 Discovery Miles 62 740 Ships in 18 - 22 working days

This text is appropriate for those courses with an emphasis on e-commerce and the Internet, as well as short courses or MBA/IS courses that want a modern approach. Networking has changed dramatically over the past ten years. Most texts have focused on network layers and their concepts and then on how the different technologies are implemented; however with the number of viable technologies shrinking, it makes less sense to focus on concepts first and technologies second. Networking in the Internet Age first edition integrates the discussion of concepts and technologies so they appear in one place, organized by layers.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

AWS Greengrass Developer Guide (Hardcover): Documentation Team AWS Greengrass Developer Guide (Hardcover)
Documentation Team
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days
WLAN Systems and Wireless IP for Next Generation Communications (Hardcover): Neeli Prasad, Anand Prasad WLAN Systems and Wireless IP for Next Generation Communications (Hardcover)
Neeli Prasad, Anand Prasad
R3,165 Discovery Miles 31 650 Ships in 18 - 22 working days

The continuing growth of wireless networks is being driven by ease of installation, flexibility and mobility, offering gains in efficiency, accuracy and lower business costs. This fresh perspective from two experts in the field provides professionals with a practical approach to design implementation, evaluation and problem-solving, which underscores its uniqueness as a hands-on guide to next generation wireless communications systems. The book offers practitioners a wealth of information on WLAN (wireless local area network) implementation, deployment and results. Key topics include: IP networking for wireless; wireless networking and Internet access standards; changes in the IEEE 802.11 standard; system design and implementation; and performance analysis.

Big Data Applications in the Telecommunications Industry (Hardcover): Ye Ouyang, Mantian Hu Big Data Applications in the Telecommunications Industry (Hardcover)
Ye Ouyang, Mantian Hu
R3,661 Discovery Miles 36 610 Ships in 18 - 22 working days

The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data

Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information... Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information Communication Technologies (Hardcover, New)
Hakikur Rahman
R7,428 Discovery Miles 74 280 Ships in 18 - 22 working days

Rapid advancements in technology have enabled the use of information and communication technologies to exchange and disseminate data and services with citizens, businesses, civil society, and other arms of government. ""The Handbook of Research on E-Government Readiness for Information and Service Exchange: Utilizing Progressive Information Communication Technologies"" formulates leading ICT strategies and critical comprehensive research for the development of efficient and effective e-government systems. This innovative collection provides cutting-edge knowledge to researchers and academicians with in-depth analysis of diversified approaches and patterns.

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover): S Geetha, Asnath Victy... Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover)
S Geetha, Asnath Victy Phamila
R5,575 Discovery Miles 55 750 Ships in 18 - 22 working days

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Examining Cloud Computing Technologies Through the Internet of Things (Hardcover): Pradeep Tomar, Gurjit Kaur Examining Cloud Computing Technologies Through the Internet of Things (Hardcover)
Pradeep Tomar, Gurjit Kaur
R5,366 Discovery Miles 53 660 Ships in 18 - 22 working days

The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.

Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print,... Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print, Hardcover, Large type / large print edition)
Faith V Summers
R471 Discovery Miles 4 710 Ships in 18 - 22 working days
VSAT Networks (Hardcover, 2nd Edition): G. Maral VSAT Networks (Hardcover, 2nd Edition)
G. Maral
R3,718 Discovery Miles 37 180 Ships in 18 - 22 working days

Now fully revised and updated, "VSAT Networks" continues to cover all of the essential issues involved with the installation and operation of networks of small earth stations called 'Very Small Aperture Terminal'. VSATs are typically one to two meters in antenna reflector diameter and communicate with one another, or with a central earth station called a 'hub', via a relay satellite in space. This informative volume enables the reader to understand how services, economics and regulatory aspects condition the success of such networks.

Key features include: configuration and practical applications of VSAT networks radio frequency (RF) link analysis, focusing on basic formulae and the evaluation of the RF link performance protocols used, with emphasis on the necessary adaptation of protocols used in terrestrial networks procedures for the dimensioning of the network according to the type and volume of generated traffic and to the expected quality of service

Written by a well-known, highly respected academic, this authoritative volume will appeal to students of telecommunications, electronics and computer science. Practising telecommunications engineers and technical managers involved in the planning, design and operation of networks and service provision will all find this book a valuable reference source.

This "Second Edition" has taken full advantage of the author's experience gained from the success of the first edition. The theoretical background has been expanded and the operational contents have been updated in view of recent developments in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer Vision - Applications of Visual…
Pancham Shukla, Rajanikanth Aluvalu, … Hardcover R4,465 Discovery Miles 44 650
Social Simulation - Technologies…
Bruce Edmonds, Cesareo Hernandez, … Hardcover R4,603 Discovery Miles 46 030
Handbook of Augmented Reality
Borko Furht Hardcover R5,300 Discovery Miles 53 000
Augmented Reality and Virtual Reality…
M. Claudia Tom Dieck, Timothy Jung Hardcover R4,646 Discovery Miles 46 460
Virtual Manufacturing
Wasim Ahmed Khan, Abdul Raouf, … Hardcover R8,077 Discovery Miles 80 770
Virtual Reality in Education…
Information Reso Management Association Hardcover R5,983 Discovery Miles 59 830
Emerging Advancements for Virtual and…
Luis Coelho, Ricardo Queiros, … Hardcover R7,962 Discovery Miles 79 620
Cases on Virtual Reality Modelling in…
Yuk Ming Tang, Ho Ho Lun, … Hardcover R9,276 Discovery Miles 92 760
When VR Serious Games Meet Special Needs…
Yiyu Cai, Qi Cao Hardcover R3,795 Discovery Miles 37 950
Connectivity and Knowledge Management in…
Cesar Camison, Daniel Palacios, … Hardcover R4,980 Discovery Miles 49 800

 

Partners