0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (250)
  • R250 - R500 (864)
  • R500+ (13,635)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Principles of Security and Trust (Hardcover): David Sands, Flemming Nielson Principles of Security and Trust (Hardcover)
David Sands, Flemming Nielson
R1,427 Discovery Miles 14 270 Ships in 18 - 22 working days
Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019): K. Erciyes Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019)
K. Erciyes
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.

Business Data Communications and Networking - A Research Perspective (Hardcover, New): Business Data Communications and Networking - A Research Perspective (Hardcover, New)
R2,635 Discovery Miles 26 350 Ships in 18 - 22 working days

The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. ""Business Data Communications and Networking: A Research Perspective"" addresses the key issues for businesses utilizing data communications and the increasing importance of networking technologies in business. ""Business Data Communications and Networking: A Research Perspective"" covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and centers on the issues of network-based applications, mobility, wireless networks, and network security.

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,217 Discovery Miles 22 170 Ships in 18 - 22 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R604 Discovery Miles 6 040 Ships in 18 - 22 working days
Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications... Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications (Hardcover)
Cesar Camison, Daniel Palacios, Fernando Garrigos, Carlos Devece
R4,980 Discovery Miles 49 800 Ships in 18 - 22 working days

Advances in computing technology and internet-worked environments have driven profound realignments not only in the dynamics of technologically mediated interpersonal interactions but also in the way organizations engage with consumers, producers, and other businesses. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications provides managers and academicians with a comprehensive review of innovations and trends in virtual organizations. Covering topics such as knowledge creation and management, virtual customer networks, e-commerce, and virtual communities this reference book offers incisive analysis of the full spectrum of technologies, applications, practices, and outcomes within this growing field.

AWS Elemental MediaLive User Guide (Hardcover): Documentation Team AWS Elemental MediaLive User Guide (Hardcover)
Documentation Team
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days
Mobile Cloud Computing - Foundations and Service Models (Paperback): Huijun Wu, Dijiang Huang Mobile Cloud Computing - Foundations and Service Models (Paperback)
Huijun Wu, Dijiang Huang
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Database Law - Perspectives from India (Hardcover, 1st ed. 2016): Anirban Mazumder Database Law - Perspectives from India (Hardcover, 1st ed. 2016)
Anirban Mazumder
R3,537 R3,277 Discovery Miles 32 770 Save R260 (7%) Ships in 10 - 15 working days

This book focuses on database law (a branch of intellectual property law) and further explores the legal protection currently available for data and data-related products in India. It offers a comparative study of the position of copyright law in protecting databases in the US and EU, while also presenting responses from the Indian database industry and its aspirations regarding the role of copyright law in database protection. India is undoubtedly leading the way as a knowledge economy. Its strengths are its information technology capability and its knowledge society, as well as its booming database industry - aspects that also necessitate the study of the role of law, as well as the protection of data and databases, in India. This book examines the growing importance of copyright law for protecting databases as well as for ensuring access in information societies. The book concludes with a discussion of key principles to be kept in mind in the context of drafting legal regimes for databases in India that will both benefit the database industry and ensure accessibility.

Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover): Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover)
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Enterprise Information Systems (EIS) allow for the sharing and coordination of information across an organization. Given the global nature of today's business, it has become necessary to develop strategic alliances and promote inter-organizational communication. This collection, entitled Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments, provides a comprehensive assessment of the latest developments in the EIS revolution. Individual chapters, which focus on Enterprise Resource Planning (ERP) adoption, the integration of enterprise systems, personalized ERP, and the Semantic Web, offer ideas and solutions for the future of the global enterprise.

Cloud Computing - Architecture and Applications (Hardcover): Jaydip Sen Cloud Computing - Architecture and Applications (Hardcover)
Jaydip Sen
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days
Surveillance Technologies and Early Warning Systems - Data Mining Applications for Risk Detection (Hardcover): Ali Serhan... Surveillance Technologies and Early Warning Systems - Data Mining Applications for Risk Detection (Hardcover)
Ali Serhan Koyuncugil, Nermin Ozgulbas
R4,583 Discovery Miles 45 830 Ships in 18 - 22 working days

Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection has never been more important, as the research this book presents an alternative to conventional surveillance and risk assessment. This book is a multidisciplinary excursion comprised of data mining, early warning systems, information technologies and risk management and explores the intersection of these components in problematic domains. It offers the ability to apply the most modern techniques to age old problems allowing for increased effectiveness in the response to future, eminent, and present risk.

A Rhetoric of Electronic Communities (Hardcover, New): Tharon W. Howard A Rhetoric of Electronic Communities (Hardcover, New)
Tharon W. Howard
R2,535 Discovery Miles 25 350 Ships in 10 - 15 working days

This book is a study of the power to monitor what is said, authorize who may speak, and even to determine what is and is not knowable within the context of electronic discourse communities. It tests the claim that the Internet and other wide-area networking systems promote participatory democracies and may serve as agencies for communal change by enabling the formation of resisting subjectivities.

AWS Snowball User Guide (Hardcover): Documentation Team AWS Snowball User Guide (Hardcover)
Documentation Team
R2,139 R1,716 Discovery Miles 17 160 Save R423 (20%) Ships in 18 - 22 working days
Creating a Local Area Network in the School Library Media Center (Hardcover, New): Becky Mather Creating a Local Area Network in the School Library Media Center (Hardcover, New)
Becky Mather
R1,884 Discovery Miles 18 840 Ships in 10 - 15 working days

Let an award-winning school library media specialist who has implemented a local area network (LAN) in her media center help you plan this important addition to your media center while avoiding the pitfalls. This hands-on practical guide contains all the information the network novice needs to plan, fund, create, and maintain a LAN in the media center. Based on the experience of the school library media specialist who received the 1994 Follett/AASL "Microcomputer in the Media Center Award" for creating a local area network in the high school media center, this guide describes the procedures for planning, designing, funding, installing, organizing, training, evaluating, and maintaining a LAN in a library media center setting. Step-by-step nontechnical instructions and advice for creating an information network are presented in an understandable format. How to expand into a school-district wide area network (WAN) and gain access to the Internet are also discussed. This comprehensive work takes the network novice from dream to implementation, maintenance, and evaluation of a local area network. It covers funding sources, tips for writing technology grants, requests for proposals from vendors, staff inservice and student training, evaluation and assessment, student internships, technology teams, troubleshooting equipment, and network administration. Useful forms, simple network schematic diagrams, a model school-board approved electronic resources policy, a glossary of technical terms, and sample assessment tools are included. No other book walks the library media specialist through every step in creating a LAN. Media professionals who want to provide networked electronic information to thestaff and students but are not sure of how to proceed will benefit from this clear, nontechnical guide to the process.

Examining Cloud Computing Technologies Through the Internet of Things (Hardcover): Pradeep Tomar, Gurjit Kaur Examining Cloud Computing Technologies Through the Internet of Things (Hardcover)
Pradeep Tomar, Gurjit Kaur
R5,366 Discovery Miles 53 660 Ships in 18 - 22 working days

The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.

Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback):... Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback)
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
R1,559 R1,479 Discovery Miles 14 790 Save R80 (5%) Ships in 10 - 15 working days

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R3,802 Discovery Miles 38 020 Ships in 18 - 22 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Communication Network Systems and Security (Hardcover): Pascal Formann Communication Network Systems and Security (Hardcover)
Pascal Formann
R2,808 R2,554 Discovery Miles 25 540 Save R254 (9%) Ships in 18 - 22 working days
AWS DeepLens Developer Guide (Hardcover): Documentation Team AWS DeepLens Developer Guide (Hardcover)
Documentation Team
R878 Discovery Miles 8 780 Ships in 18 - 22 working days
Designing Networks for Innovation and Improvisation - Proceedings of the 6th International COINs Conference (Hardcover, 1st ed.... Designing Networks for Innovation and Improvisation - Proceedings of the 6th International COINs Conference (Hardcover, 1st ed. 2016)
Matthaus P. Zylka, Hauke Fuehres, Andrea Fronzetti Colladon, Peter A. Gloor
R3,554 R3,294 Discovery Miles 32 940 Save R260 (7%) Ships in 10 - 15 working days

This volume is focused on the emerging concept of Collaborative Innovation Networks (COINs). COINs are at the core of collaborative knowledge networks, distributed communities taking advantage of the wide connectivity and the support of communication technologies, spanning beyond the organizational perimeter of companies on a global scale. It includes the refereed conference papers from the 6th International Conference on COINs, June 8-11, 2016, in Rome, Italy. It includes papers for both application areas of COINs, (1) optimizing organizational creativity and performance, and (2) discovering and predicting new trends by identifying COINs on the Web through online social media analysis. Papers at COINs16 combine a wide range of interdisciplinary fields such as social network analysis, group dynamics, design and visualization, information systems and the psychology and sociality of collaboration, and intercultural analysis through the lens of online social media. They will cover most recent advances in areas from leadership and collaboration, trend prediction and data mining, to social competence and Internet communication.

Technology Integration and Foundations for Effective Leadership (Hardcover): Shuyan Wang, Taralynn Hartsell Technology Integration and Foundations for Effective Leadership (Hardcover)
Shuyan Wang, Taralynn Hartsell
R4,500 Discovery Miles 45 000 Ships in 18 - 22 working days

As new technology continues to emerge, the training and education of learning new skills and strategies become important for professional development. Therefore, technology leadership plays a vital role for the use of technology in organizations by providing guidance in the many aspects of using technologies. Technology Integration and Foundations for Effective Leadership provides detailed information on the aspects of effective technology leadership, highlighting instructions on creating a technology plan as well as the successful integration of technology into the educational environment. This reference source aims to offer a sense of structure and basic information on designing, developing, and evaluating technology projects to ensure maximum success.

AWS CodeDeploy User Guide (Hardcover): Documentation Team AWS CodeDeploy User Guide (Hardcover)
Documentation Team
R2,228 Discovery Miles 22 280 Ships in 18 - 22 working days
Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018): Hassan Salmani Trusted Digital Circuits - Hardware Trojan Vulnerabilities, Prevention and Detection (Hardcover, 1st ed. 2018)
Hassan Salmani
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hitmen For Hire - Exposing South…
Mark Shaw Paperback  (2)
R320 Discovery Miles 3 200
Power In Action - Democracy, Citizenship…
Steven Friedman Paperback R388 Discovery Miles 3 880
Alfred'S Basic Guitar Method 1 (Third…
Morty Manus, Ron Manus Paperback R313 Discovery Miles 3 130
Park's Floral Magazine, Vol. 37: A…
Geo W Park Paperback R487 Discovery Miles 4 870
The Horticultural Register and…
Thomas Green Fessenden Paperback R642 Discovery Miles 6 420
A Treatise on the Insects Most Prevalent…
Joshua Major Paperback R534 Discovery Miles 5 340
Integrated Study of Probability and…
Calanthia Wright Hardcover R3,254 R2,943 Discovery Miles 29 430
Gramophone Presents Film Music
Martin Cullingford Paperback R407 Discovery Miles 4 070
Integrated Population Biology and…
Arni S.R. Srinivasa Rao, C.R. Rao Hardcover R6,219 Discovery Miles 62 190
Christmas Treats & Treasures 5 - 6 Piano…
Catherine Rollin Book R205 R187 Discovery Miles 1 870

 

Partners