0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (849)
  • R500+ (14,095)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Configuring NetScreen Firewalls (Paperback): Rob Cameron Configuring NetScreen Firewalls (Paperback)
Rob Cameron
R878 Discovery Miles 8 780 Ships in 12 - 19 working days

The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.
Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security Manager. This book offers novice users a complete opportunity to learn the NetScreen firewall appliance. Advanced users will find it a rich technical resource.
* NetScreen is the #2 best-selling firewall appliance in the world (behind only Cisco PIX) and there are no competing books.
* Covers the materials found on the NetScreen NCSA 5.0 exam.
* Syngress firewall books are consistent best-sellers with market-leading books on ISA Server, Cisco PIX, and Check Point Next Generation.

Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020): Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi Blockchain Cybersecurity, Trust and Privacy (Hardcover, 1st ed. 2020)
Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi
R4,931 Discovery Miles 49 310 Ships in 12 - 19 working days

This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. Topics of interest for this book include but not limited to: Blockchain-based authentication, authorization and accounting mechanisms Applications of blockchain technologies in digital forensic and threat hunting Blockchain-based threat intelligence and threat analytics techniques Formal specification of smart contracts Automated tools for outsmarting smart contracts Security and privacy aspects of blockchain technologies Vulnerabilities of smart contracts Blockchain for securing cyber infrastructure and internet of things networks Blockchain-based cybersecurity education systems This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.

Advances and New Trends in Environmental Informatics - Digital Twins for Sustainability (Hardcover, 1st ed. 2021): Andreas... Advances and New Trends in Environmental Informatics - Digital Twins for Sustainability (Hardcover, 1st ed. 2021)
Andreas Kamilaris, Volker Wohlgemuth, Kostas Karatzas, Ioannis N. Athanasiadis
R3,147 Discovery Miles 31 470 Ships in 10 - 15 working days

This book is an outcome of the 34th International Conference EnviroInfo 2020, hosted virtually in Nicosia, Cyprus by the Research Centre on Interactive Media, Smart Systems and Emerging Technologies (RISE). It presents a selection of papers that describe innovative scientific approaches and ongoing research in environmental informatics and the emerging field of environmental sustainability, promoted and facilitated by the use of information and communication technologies (ICT). The respective articles cover a broad range of scientific aspects including advances in core environmental informatics-related technologies such as earth observation, environmental modelling, big data and machine learning, robotics, smart agriculture and food solutions, renewable energy-based solutions, optimization of infrastructures, sustainable industrial processes, and citizen science, as well as applications of ICT solutions intended to support societal transformation processes toward the more sustainable management of resource use, transportation and energy supplies. Given its scope, the book is essential reading for scientists, experts and students in these fields of research. Chapter "Developing a Configuration System for a Simulation Game in the Domain of Urban CO2 Emissions Reduction" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback): Santana AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback)
Santana
R1,266 R1,158 Discovery Miles 11 580 Save R108 (9%) Ships in 12 - 19 working days

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

Recent Advances in Cryptography and Network Security (Hardcover): Pinaki Mitra Recent Advances in Cryptography and Network Security (Hardcover)
Pinaki Mitra
R2,762 Discovery Miles 27 620 Ships in 10 - 15 working days
Computational Network Application Tools for Performance Management (Hardcover, 1st ed. 2020): Millie Pant, Tarun K. Sharma,... Computational Network Application Tools for Performance Management (Hardcover, 1st ed. 2020)
Millie Pant, Tarun K. Sharma, Sebastian Basterrech, Chitresh Banerjee
R2,900 Discovery Miles 29 000 Ships in 10 - 15 working days

This book explores a range of important theoretical and practical issues in the field of computational network application tools, while also presenting the latest advances and innovations using intelligent technology approaches. The main focus is on detecting and diagnosing complex application performance problems so that an optimal and expected level of system service can be attained and maintained. The book discusses challenging issues like enhancing system efficiency, performance, and assurance management, and blends the concept of system modeling and optimization techniques with soft computing, neural network, and sensor network approaches. In addition, it presents certain metrics and measurements that can be translated into business value. These metrics and measurements can also help to establish an empirical performance baseline for various applications, which can be used to identify changes in system performance. By presenting various intelligent technologies, the book provides readers with compact but insightful information on several broad and rapidly growing areas in the computation network application domain. The book's twenty-two chapters examine and address current and future research topics in areas like neural networks, soft computing, nature-inspired computing, fuzzy logic and evolutionary computation, machine learning, smart security, and wireless networking, and cover a wide range of applications from pattern recognition and system modeling, to intelligent control problems and biomedical applications. The book was written to serve a broad readership, including engineers, computer scientists, management professionals, and mathematicians interested in studying tools and techniques for computational intelligence and applications for performance analysis. Featuring theoretical concepts and best practices in computational network applications, it will also be helpful for researchers, graduate and undergraduate students with an interest in the fields of soft computing, neural networks, machine learning, sensor networks, smart security, etc.

A Manager's Primer on e-Networking - An Introduction to Enterprise Networking in e-Business ACID Environment (Hardcover,... A Manager's Primer on e-Networking - An Introduction to Enterprise Networking in e-Business ACID Environment (Hardcover, New)
Dragan Nikolik
R2,672 Discovery Miles 26 720 Ships in 10 - 15 working days

This book negotiates the hyper dimensions of the Internet through stories from myriads of Web sites, with its fluent presentation and simple but chronological organization of topics highlighting numerous opportunities and providing a solid starting point not only for inexperienced entrepreneurs and managers but anyone interested in applying information technology in business through real or virtual enterprise networks to date. "A Manager's Primer on e-Networking" is an easy to follow primer on modern enterprise networking that every manager needs to read.

Internet of Things - Technology, Applications and Standardization (Hardcover): Jaydip Sen Internet of Things - Technology, Applications and Standardization (Hardcover)
Jaydip Sen
R3,317 Discovery Miles 33 170 Ships in 10 - 15 working days
Big Data Security (Hardcover): Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya Big Data Security (Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
R3,852 Discovery Miles 38 520 Ships in 12 - 19 working days

After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,262 Discovery Miles 12 620 Ships in 12 - 19 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Technology Development for Security Practitioners (Hardcover, 1st ed. 2021): Babak Akhgar, Dimitrios Kavallieros, Evangelos... Technology Development for Security Practitioners (Hardcover, 1st ed. 2021)
Babak Akhgar, Dimitrios Kavallieros, Evangelos Sdongos
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical infrastructures (CI), counter-terrorism, application of dark web, and analysis of a large volume of artificial intelligence data, cybercrime, serious and organised crime, border surveillance, and management of disasters and crises. This title explores various application scenarios of advanced ICT in the context of cybercrime, border security and crisis management, serious and organised crime, and protection of critical infrastructures. Readers will benefit from lessons learned from more than 30 large R&D projects within a security context. The book addresses not only theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, and includes real-world applied solutions. Chapter 11 is available open access under a Creative Commons Attribution 3.0 IGO License via link.springer.com and Chapter 16 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com

Research and Applications in Global Supercomputing (Hardcover): Richard S Segall, Jeffrey S Cook, Qingyu Zhang Research and Applications in Global Supercomputing (Hardcover)
Richard S Segall, Jeffrey S Cook, Qingyu Zhang
R7,366 Discovery Miles 73 660 Ships in 10 - 15 working days

Rapidly generating and processing large amounts of data, supercomputers are currently at the leading edge of computing technologies. Supercomputers are employed in many different fields, establishing them as an integral part of the computational sciences Research and Applications in Global Supercomputing investigates current and emerging research in the field, as well as the application of this technology to a variety of areas. Highlighting a broad range of concepts, this publication is a comprehensive reference source for professionals, researchers, students, and practitioners interested in the various topics pertaining to supercomputing and how this technology can be applied to solve problems in a multitude of disciplines.

Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover): Luis Miguel Borges,... Energy Efficient Spectrum Resources Usage in WPANs - IEEE 82.15.4 MAC Sub-layer Protocols (Hardcover)
Luis Miguel Borges, Norberto Barroca, Periklis Chatzimisios, Fernando Jose Velez
R3,038 Discovery Miles 30 380 Ships in 12 - 19 working days

Wireless Sensor Networks (WSNs) and the Internet of Things are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are challenges that need to be tackled for the future generation of WSNs. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet. The throughput and delay performance have been mathematically derived under both ideal conditions (a channel environment with no transmission errors) and non-ideal conditions (with transmission errors). Simulation results successfully validate the proposed analytical models. This research reveals the importance of an appropriate design for the MAC sub-layer protocol for the desired WSN application. Depending on the mission of the WSN application, different protocols are required. Therefore, the overall performance of a WSN application certainly depends on the development and application of suitable e.g., MAC, network layer protocols.

Stealing the Network - How to Own a Continent (Loose-leaf): Ryan Russell, Joe Grand, Tom Craig Stealing the Network - How to Own a Continent (Loose-leaf)
Ryan Russell, Joe Grand, Tom Craig
R1,157 R934 Discovery Miles 9 340 Save R223 (19%) Ships in 12 - 19 working days

This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the world

Game Theory for Cyber Deception - From Theory to Applications (Hardcover, 1st ed. 2021): Jeffrey Pawlick, Quanyan Zhu Game Theory for Cyber Deception - From Theory to Applications (Hardcover, 1st ed. 2021)
Jeffrey Pawlick, Quanyan Zhu
R3,124 Discovery Miles 31 240 Ships in 10 - 15 working days

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.

Performance Evaluation Models for Distributed Service Networks (Hardcover, 1st ed. 2021): Grzegorz Bocewicz, Jaroslaw Pempera,... Performance Evaluation Models for Distributed Service Networks (Hardcover, 1st ed. 2021)
Grzegorz Bocewicz, Jaroslaw Pempera, Victor Toporkov
R4,599 Discovery Miles 45 990 Ships in 10 - 15 working days

This book presents novel approaches to formulate, analyze, and solve problems in the area of distributed service networks, notably based on AI-related methods (parallel/cloud computing, declarative modeling, fuzzy methods). Distributed service networks are an important area of research and applications. The methods presented are meant to integrate both emerging and existing concepts and approaches for different types of production flows through synchronizations. An integration of logistics services (e.g., supply chains and projects portfolios), public and multimodal transport, traffic flow congestion management in ad hoc networks, design of high-performance cloud data centers, and milk-run distribution networks are shown as illustrations for the methods proposed. The book is of interest to researchers and practitioners in computer science, operations management, production control, and related fields.

CMOS Analog IC Design for 5G and Beyond (Hardcover, 1st ed. 2021): Sangeeta Singh, Rajeev Arya, M.P. Singh, Brijesh Iyer CMOS Analog IC Design for 5G and Beyond (Hardcover, 1st ed. 2021)
Sangeeta Singh, Rajeev Arya, M.P. Singh, Brijesh Iyer
R5,086 Discovery Miles 50 860 Ships in 10 - 15 working days

This book is focused on addressing the designs of FinFET-based analog ICs for 5G and E-band communication networks. In addition, it also incorporates some of the contemporary developments over different fields. It highlights the latest advances, problems and challenges and presents the latest research results in the field of mm-wave integrated circuits designing based on scientific literature and its practical realization. The traditional approaches are excluded in this book. The authors cover various design guidelines to be taken care for while designing these circuits and detrimental scaling effects on the same. Moreover, Gallium Nitrides (GaN) are also reported to show huge potentials for the power amplifier designing required in 5G communication network. Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing. This book incorporates the most recent FinFET architecture for the analog IC designing and the scaling effects along with the GaN technology as well.

WiFi, WiMAX, and LTE Multi-hop Mesh Networks - Basic Communication Protocols and Application Areas (Hardcover): HY Wei WiFi, WiMAX, and LTE Multi-hop Mesh Networks - Basic Communication Protocols and Application Areas (Hardcover)
HY Wei
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

"Wifi, WiMAX, and Cellular Multihop Network"s presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in learning more about WiFi and WiMAX multihop relay networks.

Applications in Electronics Pervading Industry, Environment and Society - APPLEPIES 2019 (Hardcover, 1st ed. 2020): Sergio... Applications in Electronics Pervading Industry, Environment and Society - APPLEPIES 2019 (Hardcover, 1st ed. 2020)
Sergio Saponara, Alessandro De Gloria
R5,689 Discovery Miles 56 890 Ships in 10 - 15 working days

This book provides a thorough overview of cutting-edge research on electronics applications relevant to industry, the environment, and society at large. It covers a broad spectrum of application domains, from automotive to space and from health to security, while devoting special attention to the use of embedded devices and sensors for imaging, communication and control. The book is based on the 2019 ApplePies Conference, held in Pisa, Italy in September 2019, which brought together researchers and stakeholders to consider the most significant current trends in the field of applied electronics and to debate visions for the future. Areas addressed by the conference included information communication technology; biotechnology and biomedical imaging; space; secure, clean and efficient energy; the environment; and smart, green and integrated transport. As electronics technology continues to develop apace, constantly meeting previously unthinkable targets, further attention needs to be directed toward the electronics applications and the development of systems that facilitate human activities. This book, written by industrial and academic professionals, represents a valuable contribution in this endeavor.

Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R2,158 Discovery Miles 21 580 Ships in 10 - 15 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition): Ian Foster, Carl Kesselman The Grid 2 - Blueprint for a New Computing Infrastructure (Hardcover, 2nd edition)
Ian Foster, Carl Kesselman
R1,784 Discovery Miles 17 840 Ships in 12 - 19 working days

"The Grid is an emerging infrastructure that will fundamentally change the way we think about-and use-computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure-computational capabilities, databases, sensors, and people-to be shared flexibly as true collaborative tools the Grid will have a similar transforming effect, allowing new classes of applications to emerge."
-From the Preface
In 1998, Ian Foster and Carl Kesselman introduced a whole new concept in computing with the first edition of this book. Today there is a broader and deeper understanding of the nature of the opportunities offered by Grid computing and the technologies needed to realize those opportunities. In Grid 2, the editors reveal the revolutionary impact of large-scale resource sharing and virtualization within science and industry, the intimate relationships between organization and resource sharing structures and the new technologies required to enable secure, reliable, and efficient resource sharing on large scale.
Foster and Kesselman have once again assembled a team of experts to present an up-to-date view of Grids that reports on real experiences and explains the available technologies and new technologies emerging from labs, companies and standards bodies. Grid 2, like its predecessor, serves as a manifesto, design blueprint, user guide and research agenda for future Grid systems.
*30 chapters including more than a dozen completely new chapters.
*Web access to 13 unchanged chapters from the first edition.
*Three personal essays by influential thinkers on the significance of Grids from the perspectives of infrastructure, industry, and science.
*A foundational overview of the central Grid concepts and architectural principles.
*Twelve application vignettes showcase working Grids in science, engineering, industry, and commerce.
*Detailed discussions of core architecture and services, data and knowledge management, and higher-level tools.
*Focused presentations on production Grid deployment, computing platforms, peer-to-peer technologies, and network infrastructures.
*Extensive bibliography and glossary.

Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019): Amit Kumar Singh, Anand... Handbook of Multimedia Information Security: Techniques and Applications (Hardcover, 1st ed. 2019)
Amit Kumar Singh, Anand Mohan
R7,051 Discovery Miles 70 510 Ships in 12 - 19 working days

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.

HP NonStop Server Security - A Practical Handbook (Paperback): XYPRO Technology Corp HP NonStop Server Security - A Practical Handbook (Paperback)
XYPRO Technology Corp
R2,936 R2,760 Discovery Miles 27 600 Save R176 (6%) Ships in 12 - 19 working days

Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook is a source for critical information to NonStop professionals and NonStop security administrators in particular. However, it is written in such a way as to also be extremely useful to readers new to the NonStop platform and to information security.
This handbook familiarizes auditors and those responsible for security configuration and monitoring with the aspects of the HP NonStop server operating system that make the NonStop Server unique, the security risks these aspects create, and the best ways to mitigate these risks.
.Addresses the lack of security standards for the NonStop server
.Provides information robust enough to train more security-knowledgeable staff
.The ideal accompaniment to any new HP NonStop system"

Voice, Video, and Data Network Convergence - Architecture and Design, From VoIP to Wireless (Paperback): Juanita Ellis, Joy... Voice, Video, and Data Network Convergence - Architecture and Design, From VoIP to Wireless (Paperback)
Juanita Ellis, Joy Rahman, Charles Pursell
R1,919 Discovery Miles 19 190 Ships in 12 - 19 working days

*Covers the latest standards and those being developed in an ever-evolving field
*Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
*Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions
A recent survey of 500 U.S. companies with multiple locations found that 81% are planning to implement IP Telephony on their local area networks (LANs) in 2003, and two-thirds are looking at convergence for their wide area networks (WANs) as well. This includes voice, video and data over hard line and wireless networks.
Today, new standards and technologies are being developed to support convergence and voice over IP (VoIP) and Video over IP and wireless. Because convergence covers the voice and data world, it will be critical to understand all of these environments.
This book provides detailed information on convergence network models, protocol stacks, routing algorithms, gateways and switches required to support these networks.
*Covers the latest standards and those being developed in an ever-evolving field
*Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
*Provides an understanding of the true capabilities behind each vendor's solution to allow for informed buying decisions

Game Theory Solutions for the Internet of Things - Emerging Research and Opportunities (Hardcover): Sung-Wook Kim Game Theory Solutions for the Internet of Things - Emerging Research and Opportunities (Hardcover)
Sung-Wook Kim
R3,578 Discovery Miles 35 780 Ships in 10 - 15 working days

There is an enhanced level of connectivity available in modern society through the increased usage of various technological devices. Such developments have led to the integration of smart objects into the Internet of Things (IoT), an emerging paradigm in the digital age. Game Theory Solutions for the Internet of Things: Emerging Research and Opportunities examines the latest strategies for the management of IoT systems and the application of theoretical models to enhance real-world applications and improve system efficiency. Highlighting innovative algorithms and methods, as well as coverage on cloud computing, cross-domain applications, and energy control, this book is a pivotal source of information for researchers, practitioners, graduate students, professionals, and academics interested in the game theoretic solutions for IoT applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R683 Discovery Miles 6 830
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,557 Discovery Miles 15 570

 

Partners