0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (284)
  • R250 - R500 (873)
  • R500+ (13,627)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition): David R. Bull, Fan Zhang Intelligent Image and Video Compression - Communicating Pictures (Paperback, 2nd edition)
David R. Bull, Fan Zhang
R2,606 Discovery Miles 26 060 Ships in 10 - 15 working days

Intelligent Image and Video Compression: Communicating Pictures, Second Edition explains the requirements, analysis, design and application of a modern video coding system. It draws on the authors' extensive academic and professional experience in this field to deliver a text that is algorithmically rigorous yet accessible, relevant to modern standards and practical. It builds on a thorough grounding in mathematical foundations and visual perception to demonstrate how modern image and video compression methods can be designed to meet the rate-quality performance levels demanded by today's applications and users, in the context of prevailing network constraints. "David Bull and Fan Zhang have written a timely and accessible book on the topic of image and video compression. Compression of visual signals is one of the great technological achievements of modern times, and has made possible the great successes of streaming and social media and digital cinema. Their book, Intelligent Image and Video Compression covers all the salient topics ranging over visual perception, information theory, bandpass transform theory, motion estimation and prediction, lossy and lossless compression, and of course the compression standards from MPEG (ranging from H.261 through the most modern H.266, or VVC) and the open standards VP9 and AV-1. The book is replete with clear explanations and figures, including color where appropriate, making it quite accessible and valuable to the advanced student as well as the expert practitioner. The book offers an excellent glossary and as a bonus, a set of tutorial problems. Highly recommended!" --Al Bovik

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R1,018 Discovery Miles 10 180 Ships in 10 - 15 working days

Each Student Book and ActiveBook have has clearly laid out pages with a range of supportive features to aid learning and teaching: Getting to know your unit sections ensure learners understand the grading criteria and unit requirements. Getting ready for Assessment sections focus on preparation for external assessment with guidance for learners on what to expect. Hints and tips will help them prepare for assessment and sample answers are provided for a range of question types including, short and long answer questions, all with a supporting commentary. Learners can also prepare for internal assessment using this feature. A case study of a learner completing the internal assessment for that unit covering 'How I got started', 'How I brought it all together' and 'What I got from the experience'. Pause Point feature provide opportunities for learners to self-evaluate their learning at regular intervals. Each Pause Point point feature gives learners a Hint or Extend option to either revisit and reinforce the topic or to encourage independent research or study skills. Case Study and Theory into Practice features enable development of problem-solving skills and place the theory into real life situations learners could encounter. Assessment Activity/Practice provide scaffolded assessment practice activities that help prepare learners for assessment. Within each assessment practice activity, a Plan, Do and Review section supports learners' formative assessment by making sure they fully understand what they are being asked to do, what their goals are and how to evaluate the task and consider how they could improve. Dedicated Think Future pages provide case studies from the industry, with a focus on aspects of skills development that can be put into practice in a real work environment and further study.

Managing Resources for Futuristic Wireless Networks (Hardcover): Tariq Umer Managing Resources for Futuristic Wireless Networks (Hardcover)
Tariq Umer
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

The key parameter that needs to be considered when planning the management of resources in futuristic wireless networks is a balanced approach to resource distribution. A balanced approach is necessary to provide an unbiased working environment for the distribution, sharing, allocation, and supply of resources among the devices of the wireless network. Equal resource distribution also maintains balance and stability between the operations of communication systems and thus improves the performance of wireless networks. Managing Resources for Futuristic Wireless Networks is a pivotal reference source that presents research related to the control and management of key parameters of bandwidth, spectrum sensing, channel selection, resource sharing, and task scheduling, which is necessary to ensure the efficient operation of wireless networks. Featuring topics that include vehicular ad-hoc networks, resource management, and the internet of things, this publication is ideal for professionals and researchers working in the field of networking, information and knowledge management, and communication sciences. Moreover, the book will provide insights and support executives concerned with the management of expertise, knowledge, information, and organizational development in different types of work communities and environments.

Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4... Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing, VOL 4 (Hardcover)
Information R Management Association
R12,633 Discovery Miles 126 330 Ships in 18 - 22 working days
Advances in Delay-Tolerant Networks (DTNs) - Architecture and Enhanced Performance (Paperback, 2nd edition): Joel J. P. C.... Advances in Delay-Tolerant Networks (DTNs) - Architecture and Enhanced Performance (Paperback, 2nd edition)
Joel J. P. C. Rodrigues
R4,669 Discovery Miles 46 690 Ships in 10 - 15 working days

Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection.

Tactile Internet - with Human-in-the-Loop (Paperback): Frank H. P. Fitzek, Shu-Chen Li, Stefanie Speidel, Thorsten Strufe,... Tactile Internet - with Human-in-the-Loop (Paperback)
Frank H. P. Fitzek, Shu-Chen Li, Stefanie Speidel, Thorsten Strufe, Meryem Simsek, …
R2,596 Discovery Miles 25 960 Ships in 10 - 15 working days

Tactile Internet with Human-in-the-Loop describes the change from the current Internet, which focuses on the democratization of information independent of location or time, to the Tactile Internet, which democratizes skills to promote equity that is independent of age, gender, sociocultural background or physical limitations. The book promotes the concept of the Tactile Internet for remote closed-loop human-machine interaction and describes the main challenges and key technologies. Current standardization activities in the field for IEEE and IETF are also described, making this book an ideal resource for researchers, graduate students, and industry R&D engineers in communications engineering, electronic engineering, and computer engineering.

The Digital Pivot - Secrets of Online Marketing (Hardcover): Eric Schwartzman The Digital Pivot - Secrets of Online Marketing (Hardcover)
Eric Schwartzman; Foreword by Pogue
R660 Discovery Miles 6 600 Ships in 10 - 15 working days
Digital Health - Mobile and Wearable Devices for Participatory Health Applications (Paperback): Shabbir Syed-Abdul, Xinxin Zhu,... Digital Health - Mobile and Wearable Devices for Participatory Health Applications (Paperback)
Shabbir Syed-Abdul, Xinxin Zhu, Luis Fernandez-Luque
R2,525 Discovery Miles 25 250 Ships in 10 - 15 working days

Digital Health: Mobile and Wearable Devices for Participatory Health Applications is a key reference for engineering and clinical professionals considering the development or implementation of mobile and wearable solutions in the healthcare domain. The book presents a comprehensive overview of devices and appropriateness for the respective applications. It also explores the ethical, privacy, and cybersecurity aspects inherent in networked and mobile technologies. It offers expert perspectives on various approaches to the implementation and integration of these devices and applications across all areas of healthcare. The book is designed with a multidisciplinary audience in mind; from software developers and biomedical engineers who are designing these devices to clinical professionals working with patients and engineers on device testing, human factors design, and user engagement/compliance.

Cybersecurity 2021 (Hardcover): Carl Freeman Cybersecurity 2021 (Hardcover)
Carl Freeman
R1,039 R877 Discovery Miles 8 770 Save R162 (16%) Ships in 18 - 22 working days
Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover): Ashwani Kumar, Seelam Sai Satyanarayana... Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover)
Ashwani Kumar, Seelam Sai Satyanarayana Reddy
R5,924 Discovery Miles 59 240 Ships in 18 - 22 working days

The use of digital images in today's modernized market is rapidly increasing throughout organizations due to the prevalence of social media and digital content. Companies who wish to distribute their content over the internet face numerous security risks such as copyright violation. Advanced methods for the protection and security of digital data are constantly emerging, and up-to-date research in this area is lacking. Advancements in Security and Privacy Initiatives for Multimedia Images is a collection of innovative research on the methods and applications of contemporary techniques for the security and copyright protection of images and their distribution. While highlighting topics including simulation-based security, digital watermarking protocols, and counterfeit prevention, this book is ideally designed for security analysts, researchers, developers, programmers, academicians, practitioners, students, executives, educators, and policymakers seeking current research on modern security improvements for multimedia images.

5G NR - The Next Generation Wireless Access Technology (Paperback, 2nd edition): Erik Dahlman, Stefan Parkvall, Johan Skold 5G NR - The Next Generation Wireless Access Technology (Paperback, 2nd edition)
Erik Dahlman, Stefan Parkvall, Johan Skold
R2,062 Discovery Miles 20 620 Ships in 10 - 15 working days

5G NR: The Next Generation Wireless Access Technology, Second Edition, follows the authors' highly celebrated books on 3G and 4G and provides a new level of insight into 5G NR. After background discussion of 5G, including requirements, spectrum aspects, and the standardization timeline, all technology features of the first phase of NR are described in detail. The book covers the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects, and co-existence and interworking with LTE. The book provides a good foundation in NR and different NR technology components, giving insight into why a certain solution has been selected. This second edition is updated to reflect the latest developments in Release 16 and includes brand new chapters on: NR in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in Rel-16; industrial IoT; IIoT and referring to the URLLC enhancements for PDCCH; RIM/CL; and positioning. Also included are the key radio-related requirements of NR; design principles; technical features of basic NR transmission structure-showing where it was inherited from LTE, where it deviates from it, and the reasons why- NR multi-antenna transmission functionality; detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information; random access and paging; LTE/NR co-existence in the same spectrum and the benefits of their interworking as one system; and different aspects of mobility in NR. RF requirements for NR are described for BS and UE, the legacy bands, and for the new mm-wave bands.

Security in IoT Social Networks (Paperback): Fadi Al-Turjman, B.D. Deebak Security in IoT Social Networks (Paperback)
Fadi Al-Turjman, B.D. Deebak
R2,634 Discovery Miles 26 340 Ships in 10 - 15 working days

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.

Handbook of Research on Advancing Cybersecurity for Digital Transformation (Hardcover): Kamaljeet Sandhu Handbook of Research on Advancing Cybersecurity for Digital Transformation (Hardcover)
Kamaljeet Sandhu
R7,484 Discovery Miles 74 840 Ships in 18 - 22 working days

Cybersecurity has been gaining serious attention and recently has become an important topic of concern for organizations, government institutions, and largely for people interacting with digital online systems. As many individual and organizational activities continue to grow and are conducted in the digital environment, new vulnerabilities have arisen which have led to cybersecurity threats. The nature, source, reasons, and sophistication for cyberattacks are not clearly known or understood, and many times invisible cyber attackers are never traced or can never be found. Cyberattacks can only be known once the attack and the destruction have already taken place long after the attackers have left. Cybersecurity for computer systems has increasingly become important because the government, military, corporate, financial, critical infrastructure, and medical organizations rely heavily on digital network systems, which process and store large volumes of data on computer devices that are exchanged on the internet, and they are vulnerable to ""continuous"" cyberattacks. As cybersecurity has become a global concern, it needs to be clearly understood, and innovative solutions are required. Advancing Cybersecurity for Digital Transformation: Opportunities and Challenges looks deeper into issues, problems, and innovative solutions and strategies that are linked to cybersecurity. This book will provide important knowledge that can impact the improvement of cybersecurity, which can add value in terms of innovation to solving cybersecurity threats. The chapters cover cybersecurity challenges, technologies, and solutions in the context of different industries and different types of threats. This book is ideal for cybersecurity researchers, professionals, scientists, scholars, and managers, as well as practitioners, stakeholders, researchers, academicians, and students interested in the latest advancements in cybersecurity for digital transformation.

Model-Driven Development and Operation of Multi-Cloud Applications - The MODAClouds Approach (Hardcover): Dana Petcu, Peter... Model-Driven Development and Operation of Multi-Cloud Applications - The MODAClouds Approach (Hardcover)
Dana Petcu, Peter Matthews, Elisabetta Di Nitto
R1,284 Discovery Miles 12 840 Ships in 18 - 22 working days
Computer Science Security - Concepts and Tools (Hardcover): AS Zaidoun Computer Science Security - Concepts and Tools (Hardcover)
AS Zaidoun
R3,483 Discovery Miles 34 830 Ships in 18 - 22 working days

This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks, and encourages them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools to secure legacy software and hardware. Computing has infiltrated all fields nowadays. No one can escape this wave and be immune to security attacks, which continue to evolve, gradually reducing the level of expertise needed by hackers. It is high time for each and every user to acquire basic knowledge of computer security, which would enable them to mitigate the threats they may face both personally and professionally. It is this combined expertise of individuals and organizations that will guarantee a minimum level of security for families, schools, the workplace and society in general.

Computing in Communication Networks - From Theory to Practice (Paperback): Frank H. P. Fitzek, Fabrizio Granelli, Patrick... Computing in Communication Networks - From Theory to Practice (Paperback)
Frank H. P. Fitzek, Fabrizio Granelli, Patrick Seeling
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

Computing in Communication Networks: From Theory to Practice provides comprehensive details and practical implementation tactics on the novel concepts and enabling technologies at the core of the paradigm shift from store and forward (dumb) to compute and forward (intelligent) in future communication networks and systems. The book explains how to create virtualized large scale testbeds using well-established open source software, such as Mininet and Docker. It shows how and where to place disruptive techniques, such as machine learning, compressed sensing, or network coding in a newly built testbed. In addition, it presents a comprehensive overview of current standardization activities. Specific chapters explore upcoming communication networks that support verticals in transportation, industry, construction, agriculture, health care and energy grids, underlying concepts, such as network slicing and mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN, disruptive innovations, such as network coding, compressed sensing and machine learning, how to build a virtualized network infrastructure testbed on one's own computer, and more.

Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback): Kevvie Fowler Data Breach Preparation and Response - Breaches are Certain, Impact is Not (Paperback)
Kevvie Fowler
R1,374 Discovery Miles 13 740 Ships in 10 - 15 working days

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

Edge Networking - Internet of Edges (Hardcover): K Agha Edge Networking - Internet of Edges (Hardcover)
K Agha
R3,522 Discovery Miles 35 220 Ships in 18 - 22 working days

The Internet of Edges is a new paradigm whose objective is to keep data and processing close to the user. This book presents three different levels of Edge networking: MEC (Multi-access Edge Computing), Fog and Far Edge (sometimes called Mist or Skin). It also reviews participatory networks, in which user equipment provides the resources for the Edge network. Edge networks can be disconnected from the core Internet, and the interconnection of autonomous edge networks can then form the Internet of Edges. This book analyzes the characteristics of Edge networks in detail, showing their capacity to replace the imposing Clouds of core networks due to their superior server response time, data security and energy saving.

Investigations and the Art of the Interview (Paperback, 4th edition): Inge Sebyan Black, Lawrence Fennelly Investigations and the Art of the Interview (Paperback, 4th edition)
Inge Sebyan Black, Lawrence Fennelly
R1,661 Discovery Miles 16 610 Ships in 10 - 15 working days

The Art of Investigative Interviewing, Fourth Edition, builds on the successes of the previous editions providing the reader guidance on conducting investigative interviews, both ethically and professionally. The book can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. The reader learns key elements of investigative interviewing, such as human psychology, proper interview preparation, tactical concepts, controlling the interview environment, and evaluating the evidence obtained from the interview. New to this edition will be coverage of Open Source Intelligence (OSINT) tools, workplace investigations, fraud investigations and the role of audit. Larry Fennelly joins original author Inge Sebyan Black, both well-known and respected in the field, providing everything an interviewer needs to know in order to conduct successful interviews with integrity and within the law. Written for anyone involved in investigative interviewing.

Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R777 Discovery Miles 7 770 Ships in 10 - 15 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback): I.S. Dr. Amiri, M. R. K. Soltanian Theoretical and Experimental Methods for Defending Against DDoS Attacks (Paperback)
I.S. Dr. Amiri, M. R. K. Soltanian
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim's IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback): Elahe Fazeldehkordi, I.S. Dr. Amiri,... A Study of Black Hole Attack Solutions - On AODV Routing Protocol in MANET (Paperback)
Elahe Fazeldehkordi, I.S. Dr. Amiri, Oluwatobi Ayodeji Akanbi
R1,277 Discovery Miles 12 770 Ships in 10 - 15 working days

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Randomly Deployed Wireless Sensor Networks (Paperback): XI Chen Randomly Deployed Wireless Sensor Networks (Paperback)
XI Chen
R3,004 Discovery Miles 30 040 Ships in 10 - 15 working days

Wireless sensor networks have a range of applications, including military uses and in environmental monitoring. When an area of interest is inaccessible by conventional means, such a network can be deployed in ways resulting in a random distribution of the sensors. Randomly Deployed Wireless Sensor Networks offers a probabilistic method to model and analyze these networks. The book considers the network design, coverage, target detection, localization and tracking of sensors in randomly deployed wireless networks, and proposes a stochastic model. It quantifies the relationship between parameters of the network and its performance, and puts forward a communication protocol. The title provides analyses and formulas, giving engineering insight into randomly deployed wireless sensor networks. Five chapters consider the analysis of coverage performance; working modes and scheduling mechanisms; the relationship between sensor behavior and network performance properties; probabilistic forwarding routing protocols; localization methods for multiple targets and target number estimation; and experiments on target localization and tracking with a Mica sensor system.

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,181 Discovery Miles 11 810 Ships in 18 - 22 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

From Logistic Networks to Social Networks - Similarities, Specificities, Modeling, Evaluation (Hardcover): Bourrieres From Logistic Networks to Social Networks - Similarities, Specificities, Modeling, Evaluation (Hardcover)
Bourrieres
R3,474 Discovery Miles 34 740 Ships in 18 - 22 working days

As a result of its widespread implementation in economic and social structures, the network concept appears to be a paradigm of the contemporary world. The need for various services - transport, energy, consumption of manufacturing goods, provision of care, information and communication, etc. - draws users into interwoven networks which are meshes of material and immaterial flows. In this context, the user is a consumer of goods and services from industries and administrations, or they themselves are part of the organization (digital social networks). This book examines the invariants that unify networks in their diversity, as well as the specificities that differentiate them. It provides a reading grid that distinguishes a generic level where these systems find a common interpretation, and a specific level where appropriate analytical methods are used. Three case studies from different fields are presented to illustrate the purpose of the book in detail.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Four Horsemen - The Discussion That…
Richard Dawkins, Sam Harris, … Hardcover  (3)
R480 R433 Discovery Miles 4 330
Global Implications of Emerging…
Francisco Jose Garcia-Penalvo Hardcover R4,638 Discovery Miles 46 380
Our Solar System - Revised Edition
Seymour Simon Paperback R196 Discovery Miles 1 960
First Search for the EMC Effect and…
Joel Allen Mousseau Hardcover R3,246 Discovery Miles 32 460
Understanding Educational Psychology
Irma Eloff, Estelle Swart Paperback R677 R622 Discovery Miles 6 220
A Theory of Creative Thinking…
Kekang He Hardcover R3,633 Discovery Miles 36 330
Attack of the Teenage Brain…
John Medina Paperback R773 R672 Discovery Miles 6 720
Multigrid
Ulrich Trottenberg, Cornelius W. Oosterlee, … Hardcover R2,249 Discovery Miles 22 490
International & Multidisciplinary…
Michael A. Radin Paperback R1,000 Discovery Miles 10 000
From Field to Fork - Food Ethics for…
Paul B Thompson Hardcover R3,748 Discovery Miles 37 480

 

Partners