0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (270)
  • R250 - R500 (875)
  • R500+ (13,567)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Spectrums Wars - The Policy and Technology Debate (Hardcover): Jennifer A. Manner Spectrums Wars - The Policy and Technology Debate (Hardcover)
Jennifer A. Manner
R2,198 Discovery Miles 21 980 Ships in 18 - 22 working days

Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,217 Discovery Miles 22 170 Ships in 18 - 22 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R604 Discovery Miles 6 040 Ships in 18 - 22 working days
Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications... Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications (Hardcover)
Cesar Camison, Daniel Palacios, Fernando Garrigos, Carlos Devece
R4,980 Discovery Miles 49 800 Ships in 18 - 22 working days

Advances in computing technology and internet-worked environments have driven profound realignments not only in the dynamics of technologically mediated interpersonal interactions but also in the way organizations engage with consumers, producers, and other businesses. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications provides managers and academicians with a comprehensive review of innovations and trends in virtual organizations. Covering topics such as knowledge creation and management, virtual customer networks, e-commerce, and virtual communities this reference book offers incisive analysis of the full spectrum of technologies, applications, practices, and outcomes within this growing field.

AWS Elemental MediaLive User Guide (Hardcover): Documentation Team AWS Elemental MediaLive User Guide (Hardcover)
Documentation Team
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days
Mobile Cloud Computing - Foundations and Service Models (Paperback): Huijun Wu, Dijiang Huang Mobile Cloud Computing - Foundations and Service Models (Paperback)
Huijun Wu, Dijiang Huang
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover): Amir Ekhlassi, Mahdi... Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover)
Amir Ekhlassi, Mahdi Niknejhad Moghadam, Amir Mohammad Adibi
R3,600 Discovery Miles 36 000 Ships in 18 - 22 working days

To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Social media is a useful tool for developing the relationships between businesses and consumers. Building Brand Identity in the Age of Social Media: Emerging Research and Opportunities is a critical scholarly resource that examines the media consumption and habits of consumers to evaluate the challenges of brand building. Featuring coverage on a broad range of topics such as brand identity, brand loyalty, and social media branding, this book is geared towards marketing professionals, business managers, and individuals interested in how social media fits into today's marketing environments.

Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover): Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover)
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Enterprise Information Systems (EIS) allow for the sharing and coordination of information across an organization. Given the global nature of today's business, it has become necessary to develop strategic alliances and promote inter-organizational communication. This collection, entitled Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments, provides a comprehensive assessment of the latest developments in the EIS revolution. Individual chapters, which focus on Enterprise Resource Planning (ERP) adoption, the integration of enterprise systems, personalized ERP, and the Semantic Web, offer ideas and solutions for the future of the global enterprise.

Surveillance Technologies and Early Warning Systems - Data Mining Applications for Risk Detection (Hardcover): Ali Serhan... Surveillance Technologies and Early Warning Systems - Data Mining Applications for Risk Detection (Hardcover)
Ali Serhan Koyuncugil, Nermin Ozgulbas
R4,583 Discovery Miles 45 830 Ships in 18 - 22 working days

Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection has never been more important, as the research this book presents an alternative to conventional surveillance and risk assessment. This book is a multidisciplinary excursion comprised of data mining, early warning systems, information technologies and risk management and explores the intersection of these components in problematic domains. It offers the ability to apply the most modern techniques to age old problems allowing for increased effectiveness in the response to future, eminent, and present risk.

A Rhetoric of Electronic Communities (Hardcover, New): Tharon W. Howard A Rhetoric of Electronic Communities (Hardcover, New)
Tharon W. Howard
R2,535 Discovery Miles 25 350 Ships in 10 - 15 working days

This book is a study of the power to monitor what is said, authorize who may speak, and even to determine what is and is not knowable within the context of electronic discourse communities. It tests the claim that the Internet and other wide-area networking systems promote participatory democracies and may serve as agencies for communal change by enabling the formation of resisting subjectivities.

AWS Snowball User Guide (Hardcover): Documentation Team AWS Snowball User Guide (Hardcover)
Documentation Team
R2,139 R1,716 Discovery Miles 17 160 Save R423 (20%) Ships in 18 - 22 working days
Creating a Local Area Network in the School Library Media Center (Hardcover, New): Becky Mather Creating a Local Area Network in the School Library Media Center (Hardcover, New)
Becky Mather
R1,884 Discovery Miles 18 840 Ships in 10 - 15 working days

Let an award-winning school library media specialist who has implemented a local area network (LAN) in her media center help you plan this important addition to your media center while avoiding the pitfalls. This hands-on practical guide contains all the information the network novice needs to plan, fund, create, and maintain a LAN in the media center. Based on the experience of the school library media specialist who received the 1994 Follett/AASL "Microcomputer in the Media Center Award" for creating a local area network in the high school media center, this guide describes the procedures for planning, designing, funding, installing, organizing, training, evaluating, and maintaining a LAN in a library media center setting. Step-by-step nontechnical instructions and advice for creating an information network are presented in an understandable format. How to expand into a school-district wide area network (WAN) and gain access to the Internet are also discussed. This comprehensive work takes the network novice from dream to implementation, maintenance, and evaluation of a local area network. It covers funding sources, tips for writing technology grants, requests for proposals from vendors, staff inservice and student training, evaluation and assessment, student internships, technology teams, troubleshooting equipment, and network administration. Useful forms, simple network schematic diagrams, a model school-board approved electronic resources policy, a glossary of technical terms, and sample assessment tools are included. No other book walks the library media specialist through every step in creating a LAN. Media professionals who want to provide networked electronic information to thestaff and students but are not sure of how to proceed will benefit from this clear, nontechnical guide to the process.

Examining Cloud Computing Technologies Through the Internet of Things (Hardcover): Pradeep Tomar, Gurjit Kaur Examining Cloud Computing Technologies Through the Internet of Things (Hardcover)
Pradeep Tomar, Gurjit Kaur
R5,366 Discovery Miles 53 660 Ships in 18 - 22 working days

The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.

Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback):... Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback)
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
R1,559 R1,479 Discovery Miles 14 790 Save R80 (5%) Ships in 10 - 15 working days

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

Securing Critical Infrastructures and Critical Control Systems - Approaches for Threat Protection (Hardcover, New): Christopher... Securing Critical Infrastructures and Critical Control Systems - Approaches for Threat Protection (Hardcover, New)
Christopher Laing, Atta Badii, Paul Vickers
R4,981 Discovery Miles 49 810 Ships in 18 - 22 working days

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R3,802 Discovery Miles 38 020 Ships in 18 - 22 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Technology Integration and Foundations for Effective Leadership (Hardcover): Shuyan Wang, Taralynn Hartsell Technology Integration and Foundations for Effective Leadership (Hardcover)
Shuyan Wang, Taralynn Hartsell
R4,500 Discovery Miles 45 000 Ships in 18 - 22 working days

As new technology continues to emerge, the training and education of learning new skills and strategies become important for professional development. Therefore, technology leadership plays a vital role for the use of technology in organizations by providing guidance in the many aspects of using technologies. Technology Integration and Foundations for Effective Leadership provides detailed information on the aspects of effective technology leadership, highlighting instructions on creating a technology plan as well as the successful integration of technology into the educational environment. This reference source aims to offer a sense of structure and basic information on designing, developing, and evaluating technology projects to ensure maximum success.

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,432 Discovery Miles 94 320 Ships in 18 - 22 working days
AWS DeepLens Developer Guide (Hardcover): Documentation Team AWS DeepLens Developer Guide (Hardcover)
Documentation Team
R878 Discovery Miles 8 780 Ships in 18 - 22 working days
Wireless Public Safety Networks 3 - Applications and Uses (Hardcover): Daniel Camara, Navid Nikaein Wireless Public Safety Networks 3 - Applications and Uses (Hardcover)
Daniel Camara, Navid Nikaein
R2,825 R2,654 Discovery Miles 26 540 Save R171 (6%) Ships in 10 - 15 working days

This third volume of the Wireless Public Safety Networks series explores new tendencies in the Public Safety Networks (PSNs) field, highlighting real-use cases and applications that can be used by practitioners to help victims in the case of danger. Wireless Public Safety Networks 3: Applications and Uses explores, from the communication point of view, how teams can interact with and use new technologies and tools. These technologies can have a huge impact in the field of disaster management and greatly improve the efficiency of teams handling emergency situations. This volume of the series covers themes as varied as emergency alert systems, the organization of aerial platforms and the use of smartphones to detect earthquakes and to help in the resolution of kidnappings.

Designing Networks for Innovation and Improvisation - Proceedings of the 6th International COINs Conference (Hardcover, 1st ed.... Designing Networks for Innovation and Improvisation - Proceedings of the 6th International COINs Conference (Hardcover, 1st ed. 2016)
Matthaus P. Zylka, Hauke Fuehres, Andrea Fronzetti Colladon, Peter A. Gloor
R3,554 R3,294 Discovery Miles 32 940 Save R260 (7%) Ships in 10 - 15 working days

This volume is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. It includes the refereed conference papers from the 6th International Conference on COINs, June 8-11, 2016, in Rome, Italy. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs16 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.

AWS CodeDeploy User Guide (Hardcover): Documentation Team AWS CodeDeploy User Guide (Hardcover)
Documentation Team
R2,228 Discovery Miles 22 280 Ships in 18 - 22 working days
Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018): Hassan Salmani Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018)
Hassan Salmani
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Thinking of... Force.Com as the Key to the Cloud Kingdom? Ask the Smart Questions (Hardcover): Alok Misra, Ian Gotts Thinking of... Force.Com as the Key to the Cloud Kingdom? Ask the Smart Questions (Hardcover)
Alok Misra, Ian Gotts
R763 Discovery Miles 7 630 Ships in 18 - 22 working days

This book is aimed squarely at the Independent Software Vendor (ISV) who is considering Force.com as a route to market their software offerings. Alternatively you could be part of a corporate IT department looking to deliver solutions more quickly for your business users. You have many of the same issues as the ISV, but from a slightly different perspective. This book is intended to be a catalyst for action aimed at a range of people inside and outside your organization

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Guide to Networking Essentials
Greg Tomsho Paperback R1,419 R1,315 Discovery Miles 13 150
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520

 

Partners