0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (320)
  • R250 - R500 (918)
  • R500+ (16,254)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Smart Innovation of Web of Things (Paperback): Aarti Jain, Ruben Gonzalez Crespo, Manju Khari Smart Innovation of Web of Things (Paperback)
Aarti Jain, Ruben Gonzalez Crespo, Manju Khari
R3,832 Discovery Miles 38 320 Ships in 12 - 17 working days

The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.

Computing Technologies and Applications - Paving Path Towards Society 5.0 (Hardcover): Latesh Malik, Sandhya Arora, Urmila... Computing Technologies and Applications - Paving Path Towards Society 5.0 (Hardcover)
Latesh Malik, Sandhya Arora, Urmila Shrawankar, Maya Ingle, Indu Bhagat
R4,611 Discovery Miles 46 110 Ships in 12 - 17 working days

1) Make use of digital technology for social care services is the major responsibility of computing domain. Social care services require attention for health care, old age person and disables. Thus the book focuses on suggesting software solutions for supporting societal issues such as health care, support system for old age citizens, learning and monitoring mythology for disables and also technical solutions for better living. It is considered that technology is enabling people so that they could access to advances and so that there could be benefits in the health and technology 2) Interdisciplinary computing can be applicable to all the ranges. It would remove barriers to cooperation. This book would be helpful to undergraduate, post graduate and researchers. This course is offered in many universities in US, UK etc. Interdisciplinary studies are emerging as both necessary and expedient in the academy. Hence there would be a demand for such a book. This book would also help improve computational thinking to 'understand and change the world'. It will be a link between computing and variety of other fields. 3) There are several books available on computing which either focus on programming or basics of assistive technology, online social interactions, or general topics of information science in the market currently. However, none of the available books which covers the use of recent technologies to solve real life societal problems. This book not only focuses the computing technologies, basic theories, challenges, and implementation but also covers case studies. It focuses on core theories, architectures, and technologies necessary to develop and understand the computing models and its applications. The book also has the high potential to be used as recommended textbook for research scholars and post-graduate programs.

Practical Modern SCADA Protocols - DNP3, 60870.5 and Related Systems (Paperback): Gordon Clarke, Deon Reynders Practical Modern SCADA Protocols - DNP3, 60870.5 and Related Systems (Paperback)
Gordon Clarke, Deon Reynders
R1,647 R1,534 Discovery Miles 15 340 Save R113 (7%) Ships in 12 - 17 working days

SCADA (Supervisory Control and Data Acquisition) systems are at the heart of the modern industrial enterprise ranging from mining plants, water and electrical utility installations to oil and gas plants. In a market that is crowded with high-level monographs and reference guides, more practical information for professional engineers is required. This book covers the essentials of SCADA communication systems focussing on DNP3, the IEC 60870.5 standard and other new developments in this area. It commences with a brief review of the fundamentals of SCADA systems' hardware, software and the communications systems (such as RS-232, RS-485, Ethernet and TCP/IP) that connect the SCADA Modules together. A solid review is then done on the DNP3 and IEC 60870.5 protocols where its features, message structure, practical benefits and applications are discussed. This book provides you with the knowledge to design your next SCADA system more effectively with a focus on using the latest communications technologies available.
* Covers the essentials of SCADA communication systems and other new developments in this area
* Covers a wide range of specialist networking topics and other topics ideal for practicing engineers and technicians looking to further and develop their knowledge of the subject
* Extremely timely subject as the industry has made a strong movement towards standard protocols in modern SCADA communications systems

Internet of Things, for Things, and by Things (Paperback): Abhik Chaudhuri Internet of Things, for Things, and by Things (Paperback)
Abhik Chaudhuri
R1,380 Discovery Miles 13 800 Ships in 12 - 17 working days

This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes the inherent technology of IoT, the architectural components and the philosophy behind this emerging technology. Then it shows the various potential applications of the Internet of Things that can bring benefits to the human society. Finally, it discusses various necessities to provide a secured and trustworthy IoT service.

The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Paperback): Eugene Fredriksen The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Paperback)
Eugene Fredriksen
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.

The Complete Guide to Cybersecurity Risks and Controls (Paperback): Anne Kohnke, Dan Shoemaker, Ken E. Sigler The Complete Guide to Cybersecurity Risks and Controls (Paperback)
Anne Kohnke, Dan Shoemaker, Ken E. Sigler
R1,396 Discovery Miles 13 960 Ships in 12 - 17 working days

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Hardcover, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R5,934 Discovery Miles 59 340 Ships in 12 - 17 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

Coaching Online - A Practical Guide (Hardcover): Kate Anthony, DeeAnna Merz Nagel Coaching Online - A Practical Guide (Hardcover)
Kate Anthony, DeeAnna Merz Nagel
R3,978 Discovery Miles 39 780 Ships in 12 - 17 working days

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.

Inclusive Development of Society - Proceedings of the 6th International Conference on Management and Technology in Knowledge,... Inclusive Development of Society - Proceedings of the 6th International Conference on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018) (Paperback)
Natalia Filimonova, Irina Frolova, Ford Lumban Gaol, Ignatova Vladimirovna
R2,058 Discovery Miles 20 580 Ships in 12 - 17 working days

Inclusive Development of Society contains papers that were originally presented at the 2018 International Congress on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018), held 6-7 October and 15-16 December 2018 in Kuta, Bali, Indonesia and 18-19 October, 2018 at The Southern Federal University, Rostov-on-don, Russia. The contributions deal with various interdisciplinary research topics, particularly in the fields of social sciences, economics and the arts. The papers focus especially on such topics as language, cultural studies, economics, behavior studies, political sciences, media and communication, psychology and human development. The theoretical research studies included here should provide a solid foundation for the development of new tools that explore the possibilities of developing tourism, hospitality, service industries in Knowledge Economic Era, and the empirical papers will advance our knowledge regarding the impact of information technologies in organizations' and institutions' practices. These proceedings should be of interest to academics and professionals in the wider field of social sciences, including disciplines such as education, psychology, tourism and knowledge management.

Database Management System - An Evolutionary Approach (Hardcover): Jagdish Chandra Patni, Hitesh Kumar Sharma, Ravi Tomar,... Database Management System - An Evolutionary Approach (Hardcover)
Jagdish Chandra Patni, Hitesh Kumar Sharma, Ravi Tomar, Avita Katal
R3,101 Discovery Miles 31 010 Ships in 12 - 17 working days

A database management system (DBMS) is a collection of programs that enable users to create and maintain a database; it also consists of a collection of interrelated data and a set of programs to access that data. Hence, a DBMS is a general-purpose software system that facilitates the processes of defining, constructing, and manipulating databases for various applications. The primary goal of a DBMS is to provide an environment that is both convenient and efficient to use in retrieving and storing database information. It is an interface between the user of application programs, on the one hand, and the database, on the other. The objective of Database Management System: An Evolutionary Approach, is to enable the learner to grasp a basic understanding of a DBMS, its need, and its terminologies discern the difference between the traditional file-based systems and a DBMS code while learning to grasp theory in a practical way study provided examples and case studies for better comprehension This book is intended to give under- and postgraduate students a fundamental background in DBMSs. The book follows an evolutionary learning approach that emphasizes the basic concepts and builds a strong foundation to learn more advanced topics including normalizations, normal forms, PL/SQL, transactions, concurrency control, etc. This book also gives detailed knowledge with a focus on entity-relationship (ER) diagrams and their reductions into tables, with sufficient SQL codes for a more practical understanding.

Cyber Arms - Security in Cyberspace (Paperback): Stanislav Abaimov, Maurizio Martellini Cyber Arms - Security in Cyberspace (Paperback)
Stanislav Abaimov, Maurizio Martellini
R2,247 Discovery Miles 22 470 Ships in 12 - 17 working days

This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure. The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.

Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Hardcover): Rajesh Jugulum Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Hardcover)
Rajesh Jugulum
R3,381 Discovery Miles 33 810 Ships in 12 - 17 working days

Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.

Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover): Karl Cox Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover)
Karl Cox
R3,983 Discovery Miles 39 830 Ships in 12 - 17 working days

IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,241 Discovery Miles 32 410 Ships in 12 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Assistive Technology Intervention in Healthcare (Hardcover): Shruti Jain, Sudip Paul Assistive Technology Intervention in Healthcare (Hardcover)
Shruti Jain, Sudip Paul
R3,543 Discovery Miles 35 430 Ships in 12 - 17 working days

Assistive Technology Intervention in Healthcare focuses on various applications of intelligent techniques in biomedical engineering and health informatics. It aims to create awareness about disability reduction and recovery of accidental disability with the help of various rehabilitative systems. Novel technologies in disability treatment, management and assistance, including healthcare devices and their utility from home to hospital, are described. The book deals with simulation, modeling, measurement, control, analysis, information extraction and monitoring of physiological data in clinical medicine and biology. Features Covers the latest evolutionary approaches to solve optimization problems in the biomedical engineering field Explains machine learning-based approaches to improvement in health engineering areas Reviews the IoT, cloud computing and data analytics in healthcare informatics Discusses modeling and simulations in the design of biomedical equipment Explores monitoring of physiological data This book is aimed at researchers and graduate students in biomedical engineering, clinical engineering and bioinformatics.

Assessing and Insuring Cybersecurity Risk (Hardcover): Ravi Das Assessing and Insuring Cybersecurity Risk (Hardcover)
Ravi Das
R4,434 Discovery Miles 44 340 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Continuous Delivery 2.0 - Business-leading DevOps Essentials (Hardcover): Qiao Liang Continuous Delivery 2.0 - Business-leading DevOps Essentials (Hardcover)
Qiao Liang
R2,680 Discovery Miles 26 800 Ships in 12 - 17 working days

The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.

Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders &... Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders & Practitioners (Paperback)
Emmanuel C. Ogu
R1,426 Discovery Miles 14 260 Ships in 12 - 17 working days

The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare

Future Trends in 5G and 6G - Challenges, Architecture, and Applications (Hardcover): Mangesh M. Ghonge, Ramchandra Sharad... Future Trends in 5G and 6G - Challenges, Architecture, and Applications (Hardcover)
Mangesh M. Ghonge, Ramchandra Sharad Mangrulkar, Pradip M Jawandhiya, Nitin Goje
R3,113 Discovery Miles 31 130 Ships in 12 - 17 working days

This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. Future Trends in 5G and 6G: Challenges, Architecture, and Applications addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future. It provides students, researchers, and practicing engineers with an expert guide to the fundamental concepts, challenges, architecture, applications, and state-of-the-art developments in communication and networking.

Introduction to Copper Cabling - Applications for Telecommunications, Data Communications and Networking (Paperback): John Crisp Introduction to Copper Cabling - Applications for Telecommunications, Data Communications and Networking (Paperback)
John Crisp
R1,055 R1,001 Discovery Miles 10 010 Save R54 (5%) Ships in 12 - 17 working days

Because this is a book for engineers the practical coverage is reinforced by use of the latest interanational standards, in particular BICSI standards (USA and international) and EU requirements. This will make the book ideal for the large number of industry-based training courses. Coverage has also been matched to the requirements of the revised City & Guilds 3466-04 course.
*Covers the real-world issues of selection, design, installation, testing, safety, legislation... neglected by university texts
*An easy-to-read introduction that assumes no prior knowledge beyond basic concepts of voltage and current - ideal for non-specialists as well as practitioners
*Covers new BICSI (US / international) regulations and EU framework

Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Hardcover): Adrian T. H. Kuah,... Digital Transformation in a Post-Covid World - Sustainable Innovation, Disruption, and Change (Hardcover)
Adrian T. H. Kuah, Roberto Dillon
R4,014 Discovery Miles 40 140 Ships in 12 - 17 working days

Considers how different fields across technology and business have been affected by the Covid-19 pandemic Explores the innovations, disruptions and changes that are required to adapt in a fast-evolving landscape technology Offers a wealth of perspectives from international contributors working in a variety of contexts.

Wireless Sensor Networks and the Internet of Things - Future Directions and Applications (Hardcover): Bhagirathi Nayak,... Wireless Sensor Networks and the Internet of Things - Future Directions and Applications (Hardcover)
Bhagirathi Nayak, Subhendu Kumar Pani, Tanupriya Choudhury, Suneeta Satpathy, Sachi Nandan Mohanty
R4,286 Discovery Miles 42 860 Ships in 12 - 17 working days

Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field. Different types of WSN and IoT technologies are discussed in order to provide a strong framework of reference, and the volume places an emphasis on solutions to the challenges of protection, conservation, evaluation, and implementation of WSN and IoT that lead to low-cost products, energy savings, low carbon usage, higher quality, and global competitiveness. The volume is divided into four sections that cover: Wireless sensor networks and their relevant applications Smart monitoring and control systems with the Internet of Things Attacks, threats, vulnerabilities, and defensive measures for smart systems Research challenges and opportunities This collection of chapters on an important and diverse range of issues presents case studies and applications of cutting-edge technologies of WSN and IoT that will be valuable for academic communities in computer science, information technology, and electronics, including cyber security, monitoring, and data collection. The informative material presented here can be applied to many sectors, including agriculture, energy and power, resource management, biomedical and health care, business management, and others.

Transformative Digital Technology for Effective Workplace Learning (Paperback): Ria O'Donnell Transformative Digital Technology for Effective Workplace Learning (Paperback)
Ria O'Donnell
R1,581 Discovery Miles 15 810 Ships in 12 - 17 working days

In a world bursting with new information, ideas, opportunities, and technological advancements, it is time to rethink how continuous learning shapes our future. Amidst the ongoing digital revolution, widespread educational reform, and the most significant global pandemic of our lifetimes, we are at a pivotal time in history. Transformative Digital Technology for Effective Workplace Learning explores the technological developments that are rapidly unfolding in the workplace and those that support workplace training. What emerges is that the rate of change and the possibilities for improvement are more extensive than many of us might have suspected. From artificial intelligence to virtual reality, from data analytics, to adaptive learning, there is the capacity for significant innovation and opportunity if harnessed in the right ways. The book offers an overview of several critical issues that face the future of the workplace and examines them through the lens of lifelong learning. The book begins by conveying the current impacts on the workplace and how the internal function of learning and development has evolved. It then considers the eight learning imperatives that drive workplace learning and then looks at the future workplace. Exploring technological frameworks for digitally enhanced workplace learning, the book takes a deep dive into the capabilities of immersive technologies, as well as into the insights enabled through learning analytics. The goal of this book is not to merely describe technological advancements in the workplace but instead, to challenge the status quo and think critically about the future that lies ahead. One aim is to have business leaders understand the necessity for ongoing workplace learning. Another is that individuals appreciate that lifelong learning is the new social norm. Ongoing education allows people to become more open to change and less anxious about new experiences. Developing a growth mindset and adopting a company culture that says everyone can learn new things and continue to improve their performance will become the standard. Most importantly, as the business world is reconfigured before our very eyes, ongoing learning must become an economic imperative.

Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders &... Cybersecurity for eHealth - A Simplified Guide to Practical Cybersecurity for Non-Technical Healthcare Stakeholders & Practitioners (Hardcover)
Emmanuel C. Ogu
R3,526 Discovery Miles 35 260 Ships in 12 - 17 working days

The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of digital innovation, systems, and applications in global healthcare, especially powered by modern information and communications technologies, have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient. It is now urgent that healthcare professionals understand the most relevant concepts and fundamentals of global cybersecurity related to healthcare (particularly eHealth). Cybersecurity for eHealth: A Practical Guide for Non-Technical Healthcare Stakeholders & Practitioners combines a rigorous academic and practical professional approach in covering the essentials of cybersecurity. This book Distills foundational knowledge and presents it in a concise manner that is easily assimilated Draws lessons from real-life case studies across the global healthcare industry to drive home complex concepts, principles, and insights Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity Written for healthcare professionals without a background in the technical workings of information and communication technologies, this book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth, and traverses the cybersecurity threat landscape to eHealth, including Threat categories, agents, and objectives Strategies and approaches deployed by various threat agents Predisposing risk factors in cybersecurity threat situations Basic practical techniques for protecting against cybersecurity incidents at the personal and institutional levels A comprehensive and practical guide, this book discusses approaches and best practices for enhancing personal cybersecurity, covers the basics of data and information security in healthcare, and presents an overview of the goals and responsibilities of governance, ethics, and regulation in eHealth. Who should use this book? Healthcare stakeholders and practitioners seeking a better understanding of cybersecurity as it pertains to healthcare information and communication technologies Regulatory and Board Authorities seeking to design comprehensive and foundational training programs in cybersecurity for healthcare stakeholders and practitioners Chief Information Officers and Chief Information Security Officers of healthcare organizations needing a basic internal training resource for healthcare professionals Non-technical enthusiasts seeking to understand the threat landscape and realities of cybersecurity in healthcare

5G and Next-gen Consumer Banking Services (Hardcover): Krunoslav Ris, PhD 5G and Next-gen Consumer Banking Services (Hardcover)
Krunoslav Ris, PhD
R3,233 Discovery Miles 32 330 Ships in 12 - 17 working days

The future has already begin. The banking industry needs to adjust, or it will disappear in the next decade. With the help of 5G, next-generation intelligent ATM-like devices will have highly integrated functions and use technologies such as artificial intelligences-assisted self-service contactless interfaces with facial recognition and digital signatures. This book focuses on new experiences that clients can expect when connected to a 5G network with a 5G device. By 2022 we hope that 5G will: Drive accelerated mBanking growth Power augmented reality /virtual reality Make Video shopping experiences more widespread and compelling Enable banks to deploy highly personalized customer service experiences Support time-sensitive banking applications, like online stock trading where milliseconds can determine a gain or loss Improve security and fraud prevention bycomputing and exchanging more data traveling between parties in real-time Enhance mPOS transactions and utilization. 5G holds the potential to accelerate mobile point of sale (MPOS) transaction processing time and improve connectivity In order to explore these topics, this book covers: * Decentralization of the banks * Banking without banks * 5G will change the modern banking industry * Blockchain adoption by the banking industry

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,364 R1,222 Discovery Miles 12 220
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
Cisco CyberOps Associate CBROPS 200-201…
Omar Santos Hardcover R1,401 Discovery Miles 14 010
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,347 Discovery Miles 13 470
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,949 Discovery Miles 29 490
8 Steps to Better Security - A Simple…
K Crawley Paperback R534 Discovery Miles 5 340

 

Partners