![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
This text is appropriate for those courses with an emphasis on e-commerce and the Internet, as well as short courses or MBA/IS courses that want a modern approach. Networking has changed dramatically over the past ten years. Most texts have focused on network layers and their concepts and then on how the different technologies are implemented; however with the number of viable technologies shrinking, it makes less sense to focus on concepts first and technologies second. Networking in the Internet Age first edition integrates the discussion of concepts and technologies so they appear in one place, organized by layers.
Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.
The continuing growth of wireless networks is being driven by ease of installation, flexibility and mobility, offering gains in efficiency, accuracy and lower business costs. This fresh perspective from two experts in the field provides professionals with a practical approach to design implementation, evaluation and problem-solving, which underscores its uniqueness as a hands-on guide to next generation wireless communications systems. The book offers practitioners a wealth of information on WLAN (wireless local area network) implementation, deployment and results. Key topics include: IP networking for wireless; wireless networking and Internet access standards; changes in the IEEE 802.11 standard; system design and implementation; and performance analysis.
The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data
Rapid advancements in technology have enabled the use of information and communication technologies to exchange and disseminate data and services with citizens, businesses, civil society, and other arms of government. ""The Handbook of Research on E-Government Readiness for Information and Service Exchange: Utilizing Progressive Information Communication Technologies"" formulates leading ICT strategies and critical comprehensive research for the development of efficient and effective e-government systems. This innovative collection provides cutting-edge knowledge to researchers and academicians with in-depth analysis of diversified approaches and patterns.
The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.
The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.
Now fully revised and updated, "VSAT Networks" continues to cover all of the essential issues involved with the installation and operation of networks of small earth stations called 'Very Small Aperture Terminal'. VSATs are typically one to two meters in antenna reflector diameter and communicate with one another, or with a central earth station called a 'hub', via a relay satellite in space. This informative volume enables the reader to understand how services, economics and regulatory aspects condition the success of such networks. Key features include: configuration and practical applications of VSAT networks radio frequency (RF) link analysis, focusing on basic formulae and the evaluation of the RF link performance protocols used, with emphasis on the necessary adaptation of protocols used in terrestrial networks procedures for the dimensioning of the network according to the type and volume of generated traffic and to the expected quality of service Written by a well-known, highly respected academic, this authoritative volume will appeal to students of telecommunications, electronics and computer science. Practising telecommunications engineers and technical managers involved in the planning, design and operation of networks and service provision will all find this book a valuable reference source. This "Second Edition" has taken full advantage of the author's experience gained from the success of the first edition. The theoretical background has been expanded and the operational contents have been updated in view of recent developments in the field.
This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.
This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors-all leaders in their fields-have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify patterns of analytical error that may guide security officials and policymakers as they examine the issue of cyber security before them today. French military academy instructor Thomas Flichy de La Neuville suggests another historical parallel, locating an important precursor to current debates about internet freedom in the waning control of information during the French Revolution. Italian academics Alessandro Guarino and Emilio Iasiellotake up an industrial case study, that of self-driving motor vehicles, to examine how cyberthreats might effect business and industry as they become ever more dependent on technology in the twenty-first century. Finally, the Indian scholar Sushma Devi presents a national case study, that of her native India, to assess how one of the world's most dynamic emerging economies is facing up to what was originally a first world problem. This collection anticipates endless analysis of the rapidly expanding nexus of cyber security and intelligence. It will be of undoubted use to anyone concerned with technology, the security of online business presences, national security, communications, and any other field of endeavor that will benefit from the knowledge of experts in the field.
Electronic mail, personal organizers, voice mail, all were introduced as time-saving devices designed to promote an easier and more efficient workplace. Yet many professionals find that making effective use of these new forms of communication technology can become a time-consuming task. In this handbook written for the office of the 21st century, Barbara Etzel and Peter J. Thomas provide guidance for those struggling to manage the growing volume of mail, memos, e-mail messages, and electronic documents that arrives daily. Personal Information Management details the skills professionals need to process this information, save time, and work more effectively. Etzel and Thomas present common organizational difficulties and enumerate concrete techniques for overcoming them. They guide the reader through a variety of computer software and hardware products, paper-based information products, and personal time management techniques, helping the reader to develop and individually-tailored Personal Information Management Strategy. Technologies covered include accounting and business software, word processors, databases, personal organizers, e-mail programs, tracking and storage packages, personal digital assistants, CD-Roms, computer backup devices, scanning device, voice mail, cellular phones, beepers, and fax machines, to name only a few. including an appendix listing the names and addresses of companies that Produce information technologies, Personal Information Technologies is essential reading for anyone suffering from information overload. Designed to be adaptable to emerging technologies, the techniques they provide will be applicable regardless for what the information age brings next.
Microsoft Outlook Programming unleashes the power of Microsoft
Outlook, allowing administrators and end users to customize Outlook
in the same way that they've used macros and templates to customize
other programs like Excel and Word. Experienced developers will
find the quick-start information they need to begin integrating
Outlook into their applications. Microsoft Exchange administrators
will get help automating common tasks such as announcing public
folders and importing data to custom forms.
The first book published on deploying Voice Over IP (VoIP) products
from Nortel Networks, the largest supplier of voice products in the
world.
This book expands the foundations of general systems theory to enable progress beyond the rich heuristic practices available today. It establishes a foundational framework for the development of scientific transdisciplinary systems principles and shows how these can amplify the potential of individuals and teams working in multi-, inter- and transdisciplinary contexts or striving to translate their progress across disciplinary boundaries. Three general scientific systems principles are presented, and their relevance to the design, analysis, management and transformation of systems is explored. Applying lessons from the history and philosophy science, this book disambiguates key concepts of general systemology, clarifies the role of general systemology within the field of systemology, and explains how general systemology supports other forms of transdisciplinarity. These insights are used to develop new perspectives, strategies and tools for addressing long-standing challenges to the advancement and transdisciplinary application of general insights into the nature of complex systems.The material presented in this book includes comprehensive models of the structure of systemology as a disciplinary field, the structure and significance of the general systems worldview, and the role of general systemology as the heart of systems science, systems engineering and systems practice. It explains what a fully-fledged general theory of systems would look like, what its potential is, what routes are available to us to develop it further, and how to leverage the knowledge we have attained so far. Many examples and analogies show how general systemology has the potential to enable scientific discovery, insightful theory building, and practical innovation in all the disciplines as they study, design, nurture or transform complex systems. This book is essential reading for anyone wishing to master the concepts, terminology, models and strategies needed to make effective use of current general systems knowledge and to engage in the further development of the philosophy, science, and practice of general systemology.
Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.
Blockchain is a technology that transcends cryptocurrencies. There are other services in different sectors of the economy that can benefit from the trust and security that blockchains offer. For example, financial institutions are using blockchains for international money transfer, and in logistics, it has been used for supply chain management and tracking of goods. As more global companies and governments are experimenting and deploying blockchain solutions, it is necessary to compile knowledge on the best practices, strategies, and failures in order to create a better awareness of how blockchain could either support or add value to other services. Cross-Industry Use of Blockchain Technology and Opportunities for the Future provides emerging research highlighting the possibilities inherent in blockchain for different sectors of the economy and the added value blockchain can provide for the future of these different sectors. Featuring coverage on a broad range of topics such as data privacy, information sharing, and digital identity, this book is ideally designed for IT specialists, consultants, design engineers, cryptographers, service designers, researchers, academics, government officials, and industry professionals.
Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you. The Expert Guide to PeopleSoft Security provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. The Expert Guide to PeopleSoft Security provides knowledge and insight for Administrators, Managers, Developers and Users alike. success, including: Security Design, User Profile Setup, Role & Permission List Setup, Process Security, Query Security, Row Level Security (for HR and Financials), Portal Security, Security Migrations, Definition Security, LDAP Authentication, Password Controls, Dynamic Role Creation and more. Additionally it provides an indispensable reference to PeopleSoft Security Tables as well as SQL scripts to query the security information most requested from the system. All in all The Expert Guide to PeopleSoft Security provides a comprehensive look at one of the most misunderstood but essential parts of the PeopleSoft System. Is your system properly secured?
Windows Server 2003 Security Infrastructures is a must for anyone
that wants to know the nuts and bolts of Windows Server 2003
security and wants to leverage the operating system's security
infrastructure components to build a more secure I.T.
infrastructure. The primary goal of this book is to provide
insights into the security features and technologies of the Windows
Server 2003 operating system. It also highlights the security
principles an architect should remember when designing an
infrastructure that is rooted on the Windows Server 2003 OS. |
You may like...
Elements of Hilbert Spaces and Operator…
Harkrishan Lal Vasudeva
Hardcover
R5,269
Discovery Miles 52 690
Modern Problems in Applied Analysis
Piotr Drygas, Sergei Rogosin
Hardcover
R3,320
Discovery Miles 33 200
From Fourier Analysis to Wavelets
Jonas Gomes, Luiz Velho
Hardcover
|