0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (848)
  • R500+ (14,096)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Knowledge Management Innovations for Interdisciplinary Education - Organizational Applications (Hardcover, New): Sheryl... Knowledge Management Innovations for Interdisciplinary Education - Organizational Applications (Hardcover, New)
Sheryl Beverley Buckley, Maria Jakovljevic
R4,897 Discovery Miles 48 970 Ships in 10 - 15 working days

Knowledge management innovations provide essential pathways through which teachers, researchers, students, and knowledge management professionals who are interested in understanding and applying knowledge management theory and practice can transfer their insights and experiences into both organizational and educational settings. Knowledge Management Innovations for Interdisciplinary Education: Organizational Applications is a detailed resource on knowledge management and innovations that has been written and edited to provide flexibility and in-depth knowledge management innovations, strategies, and practices. The combination of a primary emphasis on theory and practice with applications to interdisciplinary education, as well as organizational environments, makes this book unique among the burgeoning literature on knowledge management.

VLSI-SoC: New Technology Enabler - 27th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC... VLSI-SoC: New Technology Enabler - 27th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2019, Cusco, Peru, October 6-9, 2019, Revised and Extended Selected Papers (Hardcover, 1st ed. 2020)
Carolina Metzler, Pierre-Emmanuel Gaillardon, Giovanni De Micheli, Carlos Silva-Cardenas, Ricardo Reis
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

This book contains extended and revised versions of the best papers presented at the 27th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2019, held in Cusco, Peru, in October 2019. The 15 full papers included in this volume were carefully reviewed and selected from the 28 papers (out of 82 submissions) presented at the conference. The papers discuss the latest academic and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) design, considering the challenges of nano-scale, state-of-the-art and emerging manufacturing technologies. In particular they address cutting-edge research fields like heterogeneous, neuromorphic and brain-inspired, biologically-inspired, approximate computing systems.

Comparison-shopping Services and Agent Designs (Hardcover): Wang Yun Comparison-shopping Services and Agent Designs (Hardcover)
Wang Yun
R5,371 Discovery Miles 53 710 Ships in 10 - 15 working days

Popular among online shoppers, comparison-shopping provides a new sales channel for small to medium enterprises to contend with brand name vendors. ""Comparison-Shopping Services and Agent Designs"" provides a collection of comprehensive research articles on the latest technologies involved with online consumer services. This ""Premier Reference Source"" provides e-commerce and agent technology researchers, academicians, and practitioners with a useful overview as well as references to the latest advancements in the field.

Social Network Analysis and Law Enforcement - Applications for Intelligence Analysis (Hardcover, 1st ed. 2020): Morgan Burcher Social Network Analysis and Law Enforcement - Applications for Intelligence Analysis (Hardcover, 1st ed. 2020)
Morgan Burcher
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

This book examines the use of social network analysis (SNA) in operational environments from the perspective of those who actually apply it. A rapidly growing body of literature suggests that SNA can reveal significant insights into the overall structure of criminal networks as well as the position of critical actors within such groups. This book draws on the existing SNA and intelligence literature, as well as qualitative interviews with crime intelligence analysts from two Australian state law enforcement agencies to understand its use by law enforcement agencies and the extent to which it can be used in practice. It includes a discussion of the challenges that analysts face when attempting to apply various network analysis techniques to criminal networks. Overall, it advances SNA as an investigative tool, and provides a significant contribution to the field that will be of interest to both researchers and practitioners interested in social network analysis, intelligence analysis and law enforcement.

Service management and scheduling in cloud manufacturing (Hardcover): Yongkui Liu, Lin Zhang Service management and scheduling in cloud manufacturing (Hardcover)
Yongkui Liu, Lin Zhang; Contributions by Tsinghua University Press
R4,403 Discovery Miles 44 030 Ships in 12 - 19 working days

The book introduces the concept of cloud manufacturing and describes the cloud service technology system behind it. The authors discuss key technologies of manufacturing cloud service management, including service construction, evaluation and composition, and scheduling. With abundant case studies, the book is an essential reference for researchers and engineers in manufacturing and information management.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,571 Discovery Miles 25 710 Ships in 10 - 15 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication - WIDECOM 2020 (Hardcover,... 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication - WIDECOM 2020 (Hardcover, 1st ed. 2020)
Isaac Woungang, Sanjay Kumar Dhurandher
R7,550 Discovery Miles 75 500 Ships in 10 - 15 working days

This book presents the proceedings of the 3rd International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), sponsored by Ryerson University, Toronto, Canada, May 6-8, 2020. The WIDECOM conference solicits papers addressing issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), Ryerson University, Toronto, Canada, May 6-8, 2020; Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems; Addresses issues related to protecting information security and establishing trust in the digital space.

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover): Ganesh Chandra Deka, Sambit... Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (Hardcover)
Ganesh Chandra Deka, Sambit Bakshi
R9,080 Discovery Miles 90 800 Ships in 10 - 15 working days

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Information Security Management (Hardcover): Fiona Hobbs Information Security Management (Hardcover)
Fiona Hobbs
R3,440 R3,111 Discovery Miles 31 110 Save R329 (10%) Ships in 10 - 15 working days
A Knowledge Representation Practionary - Guidelines Based on Charles Sanders Peirce (Hardcover, 1st ed. 2018): Michael K.... A Knowledge Representation Practionary - Guidelines Based on Charles Sanders Peirce (Hardcover, 1st ed. 2018)
Michael K. Bergman
R5,638 Discovery Miles 56 380 Ships in 12 - 19 working days

This major work on knowledge representation is based on the writings of Charles S. Peirce, a logician, scientist, and philosopher of the first rank at the beginning of the 20th century. This book follows Peirce's practical guidelines and universal categories in a structured approach to knowledge representation that captures differences in events, entities, relations, attributes, types, and concepts. Besides the ability to capture meaning and context, the Peircean approach is also well-suited to machine learning and knowledge-based artificial intelligence. Peirce is a founder of pragmatism, the uniquely American philosophy. Knowledge representation is shorthand for how to represent human symbolic information and knowledge to computers to solve complex questions. KR applications range from semantic technologies and knowledge management and machine learning to information integration, data interoperability, and natural language understanding. Knowledge representation is an essential foundation for knowledge-based AI. This book is structured into five parts. The first and last parts are bookends that first set the context and background and conclude with practical applications. The three main parts that are the meat of the approach first address the terminologies and grammar of knowledge representation, then building blocks for KR systems, and then design, build, test, and best practices in putting a system together. Throughout, the book refers to and leverages the open source KBpedia knowledge graph and its public knowledge bases, including Wikipedia and Wikidata. KBpedia is a ready baseline for users to bridge from and expand for their own domain needs and applications. It is built from the ground up to reflect Peircean principles. This book is one of timeless, practical guidelines for how to think about KR and to design knowledge management (KM) systems. The book is grounded bedrock for enterprise information and knowledge managers who are contemplating a new knowledge initiative. This book is an essential addition to theory and practice for KR and semantic technology and AI researchers and practitioners, who will benefit from Peirce's profound understanding of meaning and context.

MPLS Network Management - MIBs, Tools, and Techniques (Hardcover): Thomas D Nadeau MPLS Network Management - MIBs, Tools, and Techniques (Hardcover)
Thomas D Nadeau
R1,711 Discovery Miles 17 110 Ships in 12 - 19 working days

MPLS-enabled networks are enjoying tremendous growth, but practical information on managing MPLS-enabled networks has remained hard to find. Until now.
MPLS Network Management: MIBs, Tools, and Techniques is the first and only book that will help you master MPLS management technologies and techniques, as they apply to classic MPLS networks, traffic-engineered networks, and VPNs. Written by the co-author of most current MPLS management standards, it provides detailed, authoritative coverage of official MIBs, examining key topics ranging from syntax to access levels to object interaction. It also offers extensive consideration of third-party management interfaces, including tools for metering traffic and predicting traffic growth and behavior. If you're a network operator, network device engineer, or MPLS application developer, you need this book to get all you can out of all of MPLS's many capabilities.
* The only book devoted entirely to the tools and techniques for controlling, monitoring, debugging, and optimizing MPLS-enabled networks.
* Authoritative information from the co-author of most IETF MIBs relating to MPLS and GMPLS, PWE3, and PPVPN.
* Covers both standards-based and proprietary management technologies.
* Includes interviews with seminal figures in the development of MPLS.
* Via a companion web site, provides information on late-breaking developments in MPLS management and links to additional resources.
* To be followed by a second volume presenting best-practice case studies dealing with how real companies approach the management of their MPLS networks.

Multimedia Cloud Computing Systems (Hardcover, 1st ed. 2021): Mohsen Amini Salehi, Xiangbo Li Multimedia Cloud Computing Systems (Hardcover, 1st ed. 2021)
Mohsen Amini Salehi, Xiangbo Li
R4,235 Discovery Miles 42 350 Ships in 12 - 19 working days

The second generation of cloud computing systems, known as domain-specific clouds, are emerging based on application-specific processors and serverless computing paradigm. As multimedia streaming services are increasingly growing in popularity and diversity, this book is authored to introduce "multimedia clouds" as a domain-specific cloud that operates in the intersection of cloud computing technologies and digital media streaming. The book concentrates on the architectural aspects of multimedia clouds and describes development of high-level abstractions that will mitigate the burden of programmers, cloud architects, and system administrators. Multimedia clouds not only democratize multimedia streaming and add flexibility to the streaming services, they also help stream providers to offer robust and reliable streaming services in a cost- and energy-efficient manner.

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R5,324 Discovery Miles 53 240 Ships in 10 - 15 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on... Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems - The Fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP) (Hardcover, 1st ed. 2021)
Yang Xu, Yongbin Sun, Yanyang Liu, Feng Gao, Pengfei Gu, …
R4,520 Discovery Miles 45 200 Ships in 10 - 15 working days

This book is a compilation of selected papers from the fifth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in November 2020 in Beijing, China. The purpose of this symposium is to discuss Inspection, test, certification and research for the software and hardware of Instrument and Control (I&C) systems in nuclear power plants (NPP), such as sensors, actuators and control system. It aims to provide a platform of technical exchange and experience sharing for those broad masses of experts and scholars and nuclear power practitioners, and for the combination of production, teaching and research in universities and enterprises to promote the safe development of nuclear power plant. Readers will find a wealth of valuable insights into achieving safer and more efficient instrumentation and control systems.

Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover): W Puech Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover)
W Puech
R4,087 Discovery Miles 40 870 Ships in 10 - 15 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Digitalisation and Human Security - A Multi-Disciplinary Approach to Cybersecurity in the European High North (Hardcover, 1st... Digitalisation and Human Security - A Multi-Disciplinary Approach to Cybersecurity in the European High North (Hardcover, 1st ed. 2020)
Mirva Salminen, Gerald Zojer, Kamrul Hossain
R4,246 Discovery Miles 42 460 Ships in 12 - 19 working days

This book constructs a multidisciplinary approach to human security questions related to digitalisation in the European High North i.e. the northernmost areas of Scandinavia, Finland and North-Western Russia. It challenges the mainstream conceptualisation of cybersecurity and reconstructs it with the human being as the referent object of security.

Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020): Brij B. Gupta, Gregorio... Handbook of Computer Networks and Cyber Security - Principles and Paradigms (Hardcover, 1st ed. 2020)
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta
R7,755 Discovery Miles 77 550 Ships in 12 - 19 working days

This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

Fourth-Generation Wireless Networks - Applications and Innovations (Hardcover, New): Fourth-Generation Wireless Networks - Applications and Innovations (Hardcover, New)
R5,184 Discovery Miles 51 840 Ships in 10 - 15 working days

Fourth generation wireless networks are expected to provide comprehensive and secure IP-based solutions, facilitating existing and emerging services such as voice, data, streamed multimedia, sensory, e-health, and social networking. It is expected that 4G will be provided to users on an "Anytime, Anywhere" basis and at much higher data rates compared to the current and previous mobile generations. Fourth-Generation Wireless Networks: Applications and Innovations presents a vision for the coming years in terms of emerging fourth generation (4G) wireless technology trends and best practices. It explores the resulting challenges and technical opportunities that will arise in creating and delivering 4G networks for the emerging applications and services. This book also examines the fundamentals of advanced physical layer and radio resource management as the basis for cross layer and cross network optimization that will emerge for increased mobility and services in video, cloud computing virtualization, entertainment, education, health, and security. This book have been organized especially for researchers, students, network engineers and designers and leaders of emerging companies, decision makers in standards, consumers, and product developers.

Transforming Cybersecurity Solutions using Blockchain (Hardcover, 1st ed. 2021): Rashmi Agrawal, Neha Gupta Transforming Cybersecurity Solutions using Blockchain (Hardcover, 1st ed. 2021)
Rashmi Agrawal, Neha Gupta
R4,116 Discovery Miles 41 160 Ships in 10 - 15 working days

This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.

Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,528 Discovery Miles 45 280 Ships in 10 - 15 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

Computer and Information Science (Hardcover, 1st ed. 2019): Roger Lee Computer and Information Science (Hardcover, 1st ed. 2019)
Roger Lee
R4,114 Discovery Miles 41 140 Ships in 10 - 15 working days

This book presents the outcomes of the 17th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2018), which was held in Singapore on June 6-8, 2018. The aim of the conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences, and to exchange new ideas and information in a meaningful way. The book includes findings on all aspects (theory, applications and tools) of computer and information science and discusses related practical challenges and the solutions adopted to solve them. The conference organizers selected the best papers from those accepted for presentation. The papers were chosen based on review scores submitted by members of the program committee and underwent a further rigorous round of review. From this second round, 13 of the conference's most promising papers were then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will make to the field of computer and information science.

From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019): Panagiotis Karampelas, Jalal... From Security to Community Detection in Social Networking Platforms (Hardcover, 1st ed. 2019)
Panagiotis Karampelas, Jalal Kawash, Tansel Ozyer
R4,120 Discovery Miles 41 200 Ships in 10 - 15 working days

This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.

Amazon QuickSight User Guide (Hardcover): Documentation Team Amazon QuickSight User Guide (Hardcover)
Documentation Team
R2,982 Discovery Miles 29 820 Ships in 10 - 15 working days
Cable Networks, Services, and Management (Hardcover): M Toy Cable Networks, Services, and Management (Hardcover)
M Toy
R3,635 Discovery Miles 36 350 Ships in 10 - 15 working days

This is the first book describing cable networks, services, and their management in greater detail by thirteen experts in various fields covering network architectures and services, operations, administration, maintenance, provisioning, troubleshooting (OAMPT) for residential services; network architectures, services, and OAMPT for business services; Software Defined Networks (SDN) and Virtualization concepts Comprehensive reference book useful for people working for a multiple systems operator Includes chapter introductions Written by 13 experts in various fields such as network services and soft defined networks

Developing Interoperable and Federated Cloud Architecture (Hardcover): Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth Developing Interoperable and Federated Cloud Architecture (Hardcover)
Gabor Kecskemeti, Attila Kertes, Zsolt Nemeth
R5,776 Discovery Miles 57 760 Ships in 10 - 15 working days

As cloud technology continues to advance and be utilized, many service providers have begun to employ multiple networks, or cloud federations; however, as the popularity of these federations increases, so does potential utilization challenges. Developing Interoperable and Federated Cloud Architecture provides valuable insight into current and emergent research occurring within the field of cloud infrastructures. Featuring barriers, recent developments, and practical applications on the interoperability issues of federated cloud architectures, this book is a focused reference for administrators, developers, and cloud users interested in energy awareness, scheduling, and federation policies and usage.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Starting Out with Python, Global Edition
Tony Gaddis Paperback R2,592 R2,367 Discovery Miles 23 670
Practical Swift
Eric Downey Paperback R2,241 R2,075 Discovery Miles 20 750
XML Data Mining - Models, Methods, and…
Andrea Tagarelli Hardcover R5,439 Discovery Miles 54 390
macOS in easy steps - Illustrated using…
Nick Vandome Paperback R381 Discovery Miles 3 810
Learn C on the Mac - For OS X and iOS
David Mark, James Bucanek Paperback R1,280 R1,086 Discovery Miles 10 860
Inside .Mac
Chuck Toporek Paperback R711 Discovery Miles 7 110
iOS Apps for Masterminds, 2nd Edition…
J. D. Gauchat Paperback R1,363 R1,170 Discovery Miles 11 700
Agent Technologies and Web Engineering…
Ghazi Alkhatib, David C. Rine Hardcover R5,351 Discovery Miles 53 510
Querying XML - XQuery, XPath, and…
Jim Melton, Stephen Buxton Paperback R1,568 Discovery Miles 15 680
AppleScript - The Comprehensive Guide to…
Hanaan Rosenthal Paperback R1,602 R1,354 Discovery Miles 13 540

 

Partners