0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (360)
  • R250 - R500 (935)
  • R500+ (14,113)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Hardcover): Attila Kovacs Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Hardcover)
Attila Kovacs
R844 R699 Discovery Miles 6 990 Save R145 (17%) Ships in 10 - 15 working days
Internet of Things (IoT) for Automated and Smart Applications (Hardcover): Yasser Ismail Internet of Things (IoT) for Automated and Smart Applications (Hardcover)
Yasser Ismail
R3,456 R3,228 Discovery Miles 32 280 Save R228 (7%) Ships in 10 - 15 working days
Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,142 Discovery Miles 11 420 Ships in 10 - 15 working days
DNSSEC Mastery, 2nd Edition (Hardcover): Michael W Lucas DNSSEC Mastery, 2nd Edition (Hardcover)
Michael W Lucas
R947 R816 Discovery Miles 8 160 Save R131 (14%) Ships in 10 - 15 working days
Architecture and Security Issues in Fog Computing Applications (Hardcover): Sam Goundar, S. Bharath Bhushan, Praveen Kumar... Architecture and Security Issues in Fog Computing Applications (Hardcover)
Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani
R6,253 Discovery Miles 62 530 Ships in 12 - 17 working days

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

Innovations in the Industrial Internet of Things (IIoT) and Smart Factory (Hardcover): Sam Goundar, J Avanija, Gurram Sunitha,... Innovations in the Industrial Internet of Things (IIoT) and Smart Factory (Hardcover)
Sam Goundar, J Avanija, Gurram Sunitha, K Reddy Madhavi, S. Bharath Bhushan
R6,546 Discovery Miles 65 460 Ships in 12 - 17 working days

Industrial internet of things (IIoT) is changing the face of industry by completely redefining the way stakeholders, enterprises, and machines connect and interact with each other in the industrial digital ecosystem. Smart and connected factories, in which all the machinery transmits real-time data, enable industrial data analytics for improving operational efficiency, productivity, and industrial processes, thus creating new business opportunities, asset utilization, and connected services. IIoT leads factories to step out of legacy environments and arcane processes towards open digital industrial ecosystems. Innovations in the Industrial Internet of Things (IIoT) and Smart Factory is a pivotal reference source that discusses the development of models and algorithms for predictive control of industrial operations and focuses on optimization of industrial operational efficiency, rationalization, automation, and maintenance. While highlighting topics such as artificial intelligence, cyber security, and data collection, this book is ideally designed for engineers, manufacturers, industrialists, managers, IT consultants, practitioners, students, researchers, and industrial industry professionals.

Heterogeneous Computing - Hardware and Software Perspectives (Hardcover): Mohamed Zahran Heterogeneous Computing - Hardware and Software Perspectives (Hardcover)
Mohamed Zahran
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

If you look around you will find that all computer systems, from your portable devices to the strongest supercomputers, are heterogeneous in nature. The most obvious heterogeneity is the existence of computing nodes of different capabilities (e.g. multicore, GPUs, FPGAs, ...). But there are also other heterogeneity factors that exist in computing systems, like the memory system components, interconnection, etc. The main reason for these different types of heterogeneity is to have good performance with power efficiency. Heterogeneous computing results in both challenges and opportunities. This book discusses both. It shows that we need to deal with these challenges at all levels of the computing stack: from algorithms all the way to process technology. We discuss the topic of heterogeneous computing from different angles: hardware challenges, current hardware state-of-the-art, software issues, how to make the best use of the current heterogeneous systems, and what lies ahead. The aim of this book is to introduce the big picture of heterogeneous computing. Whether you are a hardware designer or a software developer, you need to know how the pieces of the puzzle fit together. The main goal is to bring researchers and engineers to the forefront of the research frontier in the new era that started a few years ago and is expected to continue for decades. We believe that academics, researchers, practitioners, and students will benefit from this book and will be prepared to tackle the big wave of heterogeneous computing that is here to stay.

Computer Networking and Cybersecurity (Paperback): Quinn Kiser Computer Networking and Cybersecurity (Paperback)
Quinn Kiser
R862 R717 Discovery Miles 7 170 Save R145 (17%) Ships in 10 - 15 working days
A Hacker, I Am (Hardcover): Craig Ford A Hacker, I Am (Hardcover)
Craig Ford
R969 R795 Discovery Miles 7 950 Save R174 (18%) Ships in 10 - 15 working days
Real-Time and Retrospective Analyses of Cyber Security (Hardcover): David Anthony Bird Real-Time and Retrospective Analyses of Cyber Security (Hardcover)
David Anthony Bird
R5,612 Discovery Miles 56 120 Ships in 12 - 17 working days

Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.

Sensor Network Methodologies for Smart Applications (Hardcover): Salahddine Krit, Valentina Emilia Balas, Mohamed Elhoseny,... Sensor Network Methodologies for Smart Applications (Hardcover)
Salahddine Krit, Valentina Emilia Balas, Mohamed Elhoseny, Rachid Benlamri, Marius M. Balas
R5,624 Discovery Miles 56 240 Ships in 12 - 17 working days

Technologies in today's society are rapidly developing at a pace that is challenging to stay up to date with. As an increasing number of global regions are implementing smart methods and strategies for sustainable development, they are continually searching for modern advancements within computer science, sensor networks, software engineering, and smart technologies. A compilation of research is needed that displays current applications of computing methodologies in the progression of global cities and how smart technologies are being utilized. Sensor Network Methodologies for Smart Applications is a collection of innovative research on the methods of intelligent systems and technologies and their various applications within sustainable development practices. While highlighting topics including machine learning, network security, and optimization algorithms, this book is ideally designed for researchers, scientists, developers, programmers, engineers, educators, policymakers, geographers, planners, and students seeking current research on smart technologies and sensor networks.

Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous... Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings (Hardcover)
Daphne Tuncer, Robert Koch, Remi Badonnel
R1,403 Discovery Miles 14 030 Ships in 10 - 15 working days
Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover): Information Resources Management Association Research Anthology on BIM and Digital Twins in Smart Cities (Hardcover)
Information Resources Management Association
R12,579 Discovery Miles 125 790 Ships in 12 - 17 working days

In recent years, smart cities have been an emerging area of interest across the world. Due to this, numerous technologies and tools, such as building information modeling (BIM) and digital twins, have been developed to help achieve smart cities. To ensure research is continuously up to date and new technologies are considered within the field, further study is required. The Research Anthology on BIM and Digital Twins in Smart Cities considers the uses, challenges, and opportunities of BIM and digital twins within smart cities. Covering key topics such as data, design, urban areas, technology, and sustainability, this major reference work is ideal for industry professionals, government officials, computer scientists, policymakers, researchers, scholars, practitioners, instructors, and students.

Cryptography - Recent Advances and Future Developments (Hardcover): Riccardo Bernardini Cryptography - Recent Advances and Future Developments (Hardcover)
Riccardo Bernardini
R3,456 R3,228 Discovery Miles 32 280 Save R228 (7%) Ships in 10 - 15 working days
Applying Integration Techniques and Methods in Distributed Systems (Hardcover): Gabor Kecskemeti Applying Integration Techniques and Methods in Distributed Systems (Hardcover)
Gabor Kecskemeti
R6,384 Discovery Miles 63 840 Ships in 12 - 17 working days

Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians.

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,229 Discovery Miles 12 290 Ships in 10 - 15 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the... Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering (Hardcover)
Quinn Kiser
R724 R603 Discovery Miles 6 030 Save R121 (17%) Ships in 10 - 15 working days
8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback): K Crawley 8 Steps to Better Security - A Simple Cyber Resilience Guide for Business (Paperback)
K Crawley
R502 Discovery Miles 5 020 Ships in 12 - 17 working days

Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 8 Steps to Better Security is also a must-have resource for companies of all sizes, and in all industries.

Strategic Approaches to Digital Platform Security Assurance (Hardcover): Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves... Strategic Approaches to Digital Platform Security Assurance (Hardcover)
Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers
R5,616 Discovery Miles 56 160 Ships in 12 - 17 working days

Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.

Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback): Jeffrey... Online Predators, an Internet Insurgency - A Field Manual for Teaching and Parenting in the Digital Arena (Paperback)
Jeffrey A. Lee
R541 Discovery Miles 5 410 Ships in 12 - 17 working days

In Online Predators, An Internet Insurgency: A Field Manual for Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings his ten plus years' experience in the fight against online child exploitation to bear in an easy to follow guide for all with a stake in the life of a child. This book equips parents, guardians, extended family, and educational professionals with practical strategies to help keep kids safe in a technology connected world. Instead of focusing on ever changing technology, Lee proposes a key fundamental change in the fight against online predation-to develop an insatiable curiosity about their child's online life, then get in the front lines and stay there.

Security in Computer and Information Sciences (Hardcover): Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios Security in Computer and Information Sciences (Hardcover)
Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios
R1,346 Discovery Miles 13 460 Ships in 10 - 15 working days
Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover): Amit Kumar Tyagi Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover)
Amit Kumar Tyagi
R8,468 Discovery Miles 84 680 Ships in 12 - 17 working days

More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R9,468 Discovery Miles 94 680 Ships in 10 - 15 working days
Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover)
Adam Dodson
R593 R491 Discovery Miles 4 910 Save R102 (17%) Ships in 10 - 15 working days
Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover): Information R Management... Research Anthology on Convergence of Blockchain, Internet of Things, and Security, VOL 3 (Hardcover)
Information R Management Association
R12,566 Discovery Miles 125 660 Ships in 12 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Gathering Cloud
J. R. Carpenter Paperback R361 Discovery Miles 3 610
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,335 R1,197 Discovery Miles 11 970
E-Learning and Digital Education in the…
M. Mahruf C. Shohel Hardcover R4,049 R3,776 Discovery Miles 37 760
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R996 Discovery Miles 9 960
Guide to Networking Essentials
Greg Tomsho Paperback R1,367 R1,224 Discovery Miles 12 240
CISA - Certified Information Systems…
Cannon Paperback R1,620 R1,221 Discovery Miles 12 210
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Handbook of Research on Advancing…
Kamaljeet Sandhu Hardcover R7,909 Discovery Miles 79 090
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,212 R1,121 Discovery Miles 11 210
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,838 Discovery Miles 48 380

 

Partners