0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R4,910 Discovery Miles 49 100 Ships in 18 - 22 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Wireless Sensor Networks (Hardcover): Kevin Merriman Wireless Sensor Networks (Hardcover)
Kevin Merriman
R3,243 R2,938 Discovery Miles 29 380 Save R305 (9%) Ships in 18 - 22 working days
Networking in the Internet Age (Hardcover): A. Dennis Networking in the Internet Age (Hardcover)
A. Dennis
R6,274 Discovery Miles 62 740 Ships in 18 - 22 working days

This text is appropriate for those courses with an emphasis on e-commerce and the Internet, as well as short courses or MBA/IS courses that want a modern approach. Networking has changed dramatically over the past ten years. Most texts have focused on network layers and their concepts and then on how the different technologies are implemented; however with the number of viable technologies shrinking, it makes less sense to focus on concepts first and technologies second. Networking in the Internet Age first edition integrates the discussion of concepts and technologies so they appear in one place, organized by layers.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

AWS Greengrass Developer Guide (Hardcover): Documentation Team AWS Greengrass Developer Guide (Hardcover)
Documentation Team
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days
WLAN Systems and Wireless IP for Next Generation Communications (Hardcover): Neeli Prasad, Anand Prasad WLAN Systems and Wireless IP for Next Generation Communications (Hardcover)
Neeli Prasad, Anand Prasad
R3,165 Discovery Miles 31 650 Ships in 18 - 22 working days

The continuing growth of wireless networks is being driven by ease of installation, flexibility and mobility, offering gains in efficiency, accuracy and lower business costs. This fresh perspective from two experts in the field provides professionals with a practical approach to design implementation, evaluation and problem-solving, which underscores its uniqueness as a hands-on guide to next generation wireless communications systems. The book offers practitioners a wealth of information on WLAN (wireless local area network) implementation, deployment and results. Key topics include: IP networking for wireless; wireless networking and Internet access standards; changes in the IEEE 802.11 standard; system design and implementation; and performance analysis.

Big Data Applications in the Telecommunications Industry (Hardcover): Ye Ouyang, Mantian Hu Big Data Applications in the Telecommunications Industry (Hardcover)
Ye Ouyang, Mantian Hu
R3,661 Discovery Miles 36 610 Ships in 18 - 22 working days

The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data

Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information... Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information Communication Technologies (Hardcover, New)
Hakikur Rahman
R7,428 Discovery Miles 74 280 Ships in 18 - 22 working days

Rapid advancements in technology have enabled the use of information and communication technologies to exchange and disseminate data and services with citizens, businesses, civil society, and other arms of government. ""The Handbook of Research on E-Government Readiness for Information and Service Exchange: Utilizing Progressive Information Communication Technologies"" formulates leading ICT strategies and critical comprehensive research for the development of efficient and effective e-government systems. This innovative collection provides cutting-edge knowledge to researchers and academicians with in-depth analysis of diversified approaches and patterns.

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover): S Geetha, Asnath Victy... Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover)
S Geetha, Asnath Victy Phamila
R5,575 Discovery Miles 55 750 Ships in 18 - 22 working days

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Examining Cloud Computing Technologies Through the Internet of Things (Hardcover): Pradeep Tomar, Gurjit Kaur Examining Cloud Computing Technologies Through the Internet of Things (Hardcover)
Pradeep Tomar, Gurjit Kaur
R5,366 Discovery Miles 53 660 Ships in 18 - 22 working days

The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.

Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print,... Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print, Hardcover, Large type / large print edition)
Faith V Summers
R471 Discovery Miles 4 710 Ships in 18 - 22 working days
VSAT Networks (Hardcover, 2nd Edition): G. Maral VSAT Networks (Hardcover, 2nd Edition)
G. Maral
R3,718 Discovery Miles 37 180 Ships in 18 - 22 working days

Now fully revised and updated, "VSAT Networks" continues to cover all of the essential issues involved with the installation and operation of networks of small earth stations called 'Very Small Aperture Terminal'. VSATs are typically one to two meters in antenna reflector diameter and communicate with one another, or with a central earth station called a 'hub', via a relay satellite in space. This informative volume enables the reader to understand how services, economics and regulatory aspects condition the success of such networks.

Key features include: configuration and practical applications of VSAT networks radio frequency (RF) link analysis, focusing on basic formulae and the evaluation of the RF link performance protocols used, with emphasis on the necessary adaptation of protocols used in terrestrial networks procedures for the dimensioning of the network according to the type and volume of generated traffic and to the expected quality of service

Written by a well-known, highly respected academic, this authoritative volume will appeal to students of telecommunications, electronics and computer science. Practising telecommunications engineers and technical managers involved in the planning, design and operation of networks and service provision will all find this book a valuable reference source.

This "Second Edition" has taken full advantage of the author's experience gained from the success of the first edition. The theoretical background has been expanded and the operational contents have been updated in view of recent developments in the field.

Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New): Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New)
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.

Current Trends in Cyber Security (Hardcover): Neil Kent, Irina du Quenoy Current Trends in Cyber Security (Hardcover)
Neil Kent, Irina du Quenoy
R4,430 Discovery Miles 44 300 Ships in 18 - 22 working days

This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors-all leaders in their fields-have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify patterns of analytical error that may guide security officials and policymakers as they examine the issue of cyber security before them today. French military academy instructor Thomas Flichy de La Neuville suggests another historical parallel, locating an important precursor to current debates about internet freedom in the waning control of information during the French Revolution. Italian academics Alessandro Guarino and Emilio Iasiellotake up an industrial case study, that of self-driving motor vehicles, to examine how cyberthreats might effect business and industry as they become ever more dependent on technology in the twenty-first century. Finally, the Indian scholar Sushma Devi presents a national case study, that of her native India, to assess how one of the world's most dynamic emerging economies is facing up to what was originally a first world problem. This collection anticipates endless analysis of the rapidly expanding nexus of cyber security and intelligence. It will be of undoubted use to anyone concerned with technology, the security of online business presences, national security, communications, and any other field of endeavor that will benefit from the knowledge of experts in the field.

Personal Information Management - Tools and Techniques for Achieving Professional Effectiveness (Hardcover, New): Barbara Etzel Personal Information Management - Tools and Techniques for Achieving Professional Effectiveness (Hardcover, New)
Barbara Etzel
R2,850 Discovery Miles 28 500 Ships in 18 - 22 working days

Electronic mail, personal organizers, voice mail, all were introduced as time-saving devices designed to promote an easier and more efficient workplace. Yet many professionals find that making effective use of these new forms of communication technology can become a time-consuming task. In this handbook written for the office of the 21st century, Barbara Etzel and Peter J. Thomas provide guidance for those struggling to manage the growing volume of mail, memos, e-mail messages, and electronic documents that arrives daily.

Personal Information Management details the skills professionals need to process this information, save time, and work more effectively. Etzel and Thomas present common organizational difficulties and enumerate concrete techniques for overcoming them. They guide the reader through a variety of computer software and hardware products, paper-based information products, and personal time management techniques, helping the reader to develop and individually-tailored Personal Information Management Strategy.

Technologies covered include accounting and business software, word processors, databases, personal organizers, e-mail programs, tracking and storage packages, personal digital assistants, CD-Roms, computer backup devices, scanning device, voice mail, cellular phones, beepers, and fax machines, to name only a few. including an appendix listing the names and addresses of companies that Produce information technologies, Personal Information Technologies is essential reading for anyone suffering from information overload. Designed to be adaptable to emerging technologies, the techniques they provide will be applicable regardless for what the information age brings next.

Discrete Password Logbook - Kitty Cats Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Kitty Cats Edition (Hardcover)
Suzeteo Enterprises
R506 Discovery Miles 5 060 Ships in 18 - 22 working days
Microsoft Outlook Programming - Jumpstart for Administrators, Developers, and Power Users (Paperback): Sue Mosher Microsoft Outlook Programming - Jumpstart for Administrators, Developers, and Power Users (Paperback)
Sue Mosher
R2,242 Discovery Miles 22 420 Ships in 10 - 15 working days

Microsoft Outlook Programming unleashes the power of Microsoft Outlook, allowing administrators and end users to customize Outlook in the same way that they've used macros and templates to customize other programs like Excel and Word. Experienced developers will find the quick-start information they need to begin integrating Outlook into their applications. Microsoft Exchange administrators will get help automating common tasks such as announcing public folders and importing data to custom forms.
Microsoft Outlook is the most widely used email program, and it offers the most programmability. This book introduces key concepts for programming both Outlook forms for storing and exchanging data and Visual Basic for Applications modules that add new features to Outlook. Central to this new edition, which covers both Outlook 2000 and Outlook 2002, is awareness of tighter security in Outlook. Designed to prevent transmission of computer viruses, the security restrictions can also get in the way of legitimate programs, but this book offers workarounds within the reach of novice programmers. It also covers many of the new features of Outlook 2002, such as the integrated Outlook View Control and searching across multiple folders using SQL syntax and the Search object.
-Building block procedures for the most common Outlook programming tasks
-Jargon-free language and practical examples to make the material more accessible to new Outlook programmers
-Coverage of Outlook Email Security Update
-Coverage of the Office XP Web Services Toolkit

Building a VoIP Network with Nortel's Multimedia Communication Server 5100 (Paperback): Larry Chaffin Building a VoIP Network with Nortel's Multimedia Communication Server 5100 (Paperback)
Larry Chaffin
R1,819 Discovery Miles 18 190 Ships in 10 - 15 working days

The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.
This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel s hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel s entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.
. If you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products, then this is the only book you need.
. It shows how you'll be able to design, build, secure, and maintaining a cutting-edge converged network to satisfy all of your business requirements
. Also covers how to secure your entire multimedia network from malicious attacks"

General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018): David Rousseau,... General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018)
David Rousseau, Jennifer Wilby, Julie Billingham, Stefan Blachfellner
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This book expands the foundations of general systems theory to enable progress beyond the rich heuristic practices available today. It establishes a foundational framework for the development of scientific transdisciplinary systems principles and shows how these can amplify the potential of individuals and teams working in multi-, inter- and transdisciplinary contexts or striving to translate their progress across disciplinary boundaries. Three general scientific systems principles are presented, and their relevance to the design, analysis, management and transformation of systems is explored. Applying lessons from the history and philosophy science, this book disambiguates key concepts of general systemology, clarifies the role of general systemology within the field of systemology, and explains how general systemology supports other forms of transdisciplinarity. These insights are used to develop new perspectives, strategies and tools for addressing long-standing challenges to the advancement and transdisciplinary application of general insights into the nature of complex systems.The material presented in this book includes comprehensive models of the structure of systemology as a disciplinary field, the structure and significance of the general systems worldview, and the role of general systemology as the heart of systems science, systems engineering and systems practice. It explains what a fully-fledged general theory of systems would look like, what its potential is, what routes are available to us to develop it further, and how to leverage the knowledge we have attained so far. Many examples and analogies show how general systemology has the potential to enable scientific discovery, insightful theory building, and practical innovation in all the disciplines as they study, design, nurture or transform complex systems. This book is essential reading for anyone wishing to master the concepts, terminology, models and strategies needed to make effective use of current general systems knowledge and to engage in the further development of the philosophy, science, and practice of general systemology.

Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks (Hardcover): Biswa Mohan... Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks (Hardcover)
Biswa Mohan Sahoo, Suman Avdhesh Yadav
R6,170 Discovery Miles 61 700 Ships in 18 - 22 working days

Information security practices are the backbone of smart factories, which dynamically coordinate and optimize production processes based on data produced and collected by the underlying cyber-physical systems, in terms of resource usage. Recent advances in the best practices, opportunities, challenges, and benefits of information security must be studied and considered for businesses across sectors to successfully utilize the practices in their internet of things, 5G, and next-generation wireless networks. Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks highlights research on secure communication of 5G, internet of things, and next-generation wireless networks along with related areas to ensure secure and internet-compatible internet of things systems. The book also discusses the effects of the internet of things technologies on various situations in smart city design. Covering a range of topics such as secure communications and security evaluations, this reference work is ideal for industry professionals, business owners, engineers, researchers, scholars, practitioners, academicians, instructors, and students.

Cross-Industry Use of Blockchain Technology and Opportunities for the Future (Hardcover): Idongesit Williams Cross-Industry Use of Blockchain Technology and Opportunities for the Future (Hardcover)
Idongesit Williams
R6,199 Discovery Miles 61 990 Ships in 18 - 22 working days

Blockchain is a technology that transcends cryptocurrencies. There are other services in different sectors of the economy that can benefit from the trust and security that blockchains offer. For example, financial institutions are using blockchains for international money transfer, and in logistics, it has been used for supply chain management and tracking of goods. As more global companies and governments are experimenting and deploying blockchain solutions, it is necessary to compile knowledge on the best practices, strategies, and failures in order to create a better awareness of how blockchain could either support or add value to other services. Cross-Industry Use of Blockchain Technology and Opportunities for the Future provides emerging research highlighting the possibilities inherent in blockchain for different sectors of the economy and the added value blockchain can provide for the future of these different sectors. Featuring coverage on a broad range of topics such as data privacy, information sharing, and digital identity, this book is ideally designed for IT specialists, consultants, design engineers, cryptographers, service designers, researchers, academics, government officials, and industry professionals.

Amazon Transcribe Developer Guide (Hardcover): Documentation Team Amazon Transcribe Developer Guide (Hardcover)
Documentation Team
R881 Discovery Miles 8 810 Ships in 18 - 22 working days
The Expert Guide to PeopleSoft Security (Hardcover): Jason Carter The Expert Guide to PeopleSoft Security (Hardcover)
Jason Carter
R662 R591 Discovery Miles 5 910 Save R71 (11%) Ships in 18 - 22 working days

Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you. The Expert Guide to PeopleSoft Security provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. The Expert Guide to PeopleSoft Security provides knowledge and insight for Administrators, Managers, Developers and Users alike. success, including: Security Design, User Profile Setup, Role & Permission List Setup, Process Security, Query Security, Row Level Security (for HR and Financials), Portal Security, Security Migrations, Definition Security, LDAP Authentication, Password Controls, Dynamic Role Creation and more. Additionally it provides an indispensable reference to PeopleSoft Security Tables as well as SQL scripts to query the security information most requested from the system. All in all The Expert Guide to PeopleSoft Security provides a comprehensive look at one of the most misunderstood but essential parts of the PeopleSoft System. Is your system properly secured?

Windows Server 2003 Security Infrastructures - Core Security Features (Paperback): Jan de Clercq Windows Server 2003 Security Infrastructures - Core Security Features (Paperback)
Jan de Clercq
R2,372 Discovery Miles 23 720 Ships in 10 - 15 working days

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.
*Explains nuts and bolts of Windows Server 2003 security
*Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures
*Draws on the experience of a lead consultant in the Microsoft security area

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ex-Combatants, Gender and Peace in…
Azrini Wahidin Hardcover R3,848 Discovery Miles 38 480
Legacy - Gangsters, Corruption And The…
Michael Gillard Paperback R373 R338 Discovery Miles 3 380
Elements of Hilbert Spaces and Operator…
Harkrishan Lal Vasudeva Hardcover R5,269 Discovery Miles 52 690
Busting the Mob - The United States v…
James B. Jacobs Hardcover R2,870 Discovery Miles 28 700
The Snakehead - An Epic Tale of the…
Patrick Radden Keefe Paperback R299 R271 Discovery Miles 2 710
Studies in Gangs and Cartels
Robert J. Bunker Paperback R1,151 Discovery Miles 11 510
L(2) Approaches in Several Complex…
Takeo Ohsawa Hardcover R3,128 Discovery Miles 31 280
Harmonic Analysis on Symmetric…
Audrey Terras Hardcover R3,137 Discovery Miles 31 370
Modern Problems in Applied Analysis
Piotr Drygas, Sergei Rogosin Hardcover R3,320 Discovery Miles 33 200
From Fourier Analysis to Wavelets
Jonas Gomes, Luiz Velho Hardcover R2,634 R1,836 Discovery Miles 18 360

 

Partners