0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (858)
  • R500+ (13,712)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover): W Puech Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover)
W Puech
R3,771 Discovery Miles 37 710 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Cryptographic Security Solutions for the Internet of Things (Hardcover): Mohammad Tariq Banday Cryptographic Security Solutions for the Internet of Things (Hardcover)
Mohammad Tariq Banday
R4,910 Discovery Miles 49 100 Ships in 18 - 22 working days

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

AWS Elemental MediaLive User Guide (Hardcover): Documentation Team AWS Elemental MediaLive User Guide (Hardcover)
Documentation Team
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days
Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

WLAN Systems and Wireless IP for Next Generation Communications (Hardcover): Neeli Prasad, Anand Prasad WLAN Systems and Wireless IP for Next Generation Communications (Hardcover)
Neeli Prasad, Anand Prasad
R3,165 Discovery Miles 31 650 Ships in 18 - 22 working days

The continuing growth of wireless networks is being driven by ease of installation, flexibility and mobility, offering gains in efficiency, accuracy and lower business costs. This fresh perspective from two experts in the field provides professionals with a practical approach to design implementation, evaluation and problem-solving, which underscores its uniqueness as a hands-on guide to next generation wireless communications systems. The book offers practitioners a wealth of information on WLAN (wireless local area network) implementation, deployment and results. Key topics include: IP networking for wireless; wireless networking and Internet access standards; changes in the IEEE 802.11 standard; system design and implementation; and performance analysis.

Big Data Applications in the Telecommunications Industry (Hardcover): Ye Ouyang, Mantian Hu Big Data Applications in the Telecommunications Industry (Hardcover)
Ye Ouyang, Mantian Hu
R3,661 Discovery Miles 36 610 Ships in 18 - 22 working days

The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data

Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information... Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information Communication Technologies (Hardcover, New)
Hakikur Rahman
R7,428 Discovery Miles 74 280 Ships in 18 - 22 working days

Rapid advancements in technology have enabled the use of information and communication technologies to exchange and disseminate data and services with citizens, businesses, civil society, and other arms of government. ""The Handbook of Research on E-Government Readiness for Information and Service Exchange: Utilizing Progressive Information Communication Technologies"" formulates leading ICT strategies and critical comprehensive research for the development of efficient and effective e-government systems. This innovative collection provides cutting-edge knowledge to researchers and academicians with in-depth analysis of diversified approaches and patterns.

Amazon Transcribe Developer Guide (Hardcover): Documentation Team Amazon Transcribe Developer Guide (Hardcover)
Documentation Team
R881 Discovery Miles 8 810 Ships in 18 - 22 working days
Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover): S Geetha, Asnath Victy... Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover)
S Geetha, Asnath Victy Phamila
R5,575 Discovery Miles 55 750 Ships in 18 - 22 working days

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R604 Discovery Miles 6 040 Ships in 18 - 22 working days
Examining Cloud Computing Technologies Through the Internet of Things (Hardcover): Pradeep Tomar, Gurjit Kaur Examining Cloud Computing Technologies Through the Internet of Things (Hardcover)
Pradeep Tomar, Gurjit Kaur
R5,366 Discovery Miles 53 660 Ships in 18 - 22 working days

The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.

Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print,... Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print, Hardcover, Large type / large print edition)
Faith V Summers
R471 Discovery Miles 4 710 Ships in 18 - 22 working days
VSAT Networks (Hardcover, 2nd Edition): G. Maral VSAT Networks (Hardcover, 2nd Edition)
G. Maral
R3,718 Discovery Miles 37 180 Ships in 18 - 22 working days

Now fully revised and updated, "VSAT Networks" continues to cover all of the essential issues involved with the installation and operation of networks of small earth stations called 'Very Small Aperture Terminal'. VSATs are typically one to two meters in antenna reflector diameter and communicate with one another, or with a central earth station called a 'hub', via a relay satellite in space. This informative volume enables the reader to understand how services, economics and regulatory aspects condition the success of such networks.

Key features include: configuration and practical applications of VSAT networks radio frequency (RF) link analysis, focusing on basic formulae and the evaluation of the RF link performance protocols used, with emphasis on the necessary adaptation of protocols used in terrestrial networks procedures for the dimensioning of the network according to the type and volume of generated traffic and to the expected quality of service

Written by a well-known, highly respected academic, this authoritative volume will appeal to students of telecommunications, electronics and computer science. Practising telecommunications engineers and technical managers involved in the planning, design and operation of networks and service provision will all find this book a valuable reference source.

This "Second Edition" has taken full advantage of the author's experience gained from the success of the first edition. The theoretical background has been expanded and the operational contents have been updated in view of recent developments in the field.

AWS DeepLens Developer Guide (Hardcover): Documentation Team AWS DeepLens Developer Guide (Hardcover)
Documentation Team
R878 Discovery Miles 8 780 Ships in 18 - 22 working days
Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R689 R618 Discovery Miles 6 180 Save R71 (10%) Ships in 18 - 22 working days
Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New): Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New)
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.

Personal Information Management - Tools and Techniques for Achieving Professional Effectiveness (Hardcover, New): Barbara Etzel Personal Information Management - Tools and Techniques for Achieving Professional Effectiveness (Hardcover, New)
Barbara Etzel
R2,850 Discovery Miles 28 500 Ships in 18 - 22 working days

Electronic mail, personal organizers, voice mail, all were introduced as time-saving devices designed to promote an easier and more efficient workplace. Yet many professionals find that making effective use of these new forms of communication technology can become a time-consuming task. In this handbook written for the office of the 21st century, Barbara Etzel and Peter J. Thomas provide guidance for those struggling to manage the growing volume of mail, memos, e-mail messages, and electronic documents that arrives daily.

Personal Information Management details the skills professionals need to process this information, save time, and work more effectively. Etzel and Thomas present common organizational difficulties and enumerate concrete techniques for overcoming them. They guide the reader through a variety of computer software and hardware products, paper-based information products, and personal time management techniques, helping the reader to develop and individually-tailored Personal Information Management Strategy.

Technologies covered include accounting and business software, word processors, databases, personal organizers, e-mail programs, tracking and storage packages, personal digital assistants, CD-Roms, computer backup devices, scanning device, voice mail, cellular phones, beepers, and fax machines, to name only a few. including an appendix listing the names and addresses of companies that Produce information technologies, Personal Information Technologies is essential reading for anyone suffering from information overload. Designed to be adaptable to emerging technologies, the techniques they provide will be applicable regardless for what the information age brings next.

General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018): David Rousseau,... General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018)
David Rousseau, Jennifer Wilby, Julie Billingham, Stefan Blachfellner
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This book expands the foundations of general systems theory to enable progress beyond the rich heuristic practices available today. It establishes a foundational framework for the development of scientific transdisciplinary systems principles and shows how these can amplify the potential of individuals and teams working in multi-, inter- and transdisciplinary contexts or striving to translate their progress across disciplinary boundaries. Three general scientific systems principles are presented, and their relevance to the design, analysis, management and transformation of systems is explored. Applying lessons from the history and philosophy science, this book disambiguates key concepts of general systemology, clarifies the role of general systemology within the field of systemology, and explains how general systemology supports other forms of transdisciplinarity. These insights are used to develop new perspectives, strategies and tools for addressing long-standing challenges to the advancement and transdisciplinary application of general insights into the nature of complex systems.The material presented in this book includes comprehensive models of the structure of systemology as a disciplinary field, the structure and significance of the general systems worldview, and the role of general systemology as the heart of systems science, systems engineering and systems practice. It explains what a fully-fledged general theory of systems would look like, what its potential is, what routes are available to us to develop it further, and how to leverage the knowledge we have attained so far. Many examples and analogies show how general systemology has the potential to enable scientific discovery, insightful theory building, and practical innovation in all the disciplines as they study, design, nurture or transform complex systems. This book is essential reading for anyone wishing to master the concepts, terminology, models and strategies needed to make effective use of current general systems knowledge and to engage in the further development of the philosophy, science, and practice of general systemology.

Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020): Shiho Kim, Ganesh Chandra Deka Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020)
Shiho Kim, Ganesh Chandra Deka
R4,639 Discovery Miles 46 390 Ships in 10 - 15 working days

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

Securing Critical Infrastructures and Critical Control Systems - Approaches for Threat Protection (Hardcover, New): Christopher... Securing Critical Infrastructures and Critical Control Systems - Approaches for Threat Protection (Hardcover, New)
Christopher Laing, Atta Badii, Paul Vickers
R4,981 Discovery Miles 49 810 Ships in 18 - 22 working days

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.

Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover): Amir Ekhlassi, Mahdi... Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover)
Amir Ekhlassi, Mahdi Niknejhad Moghadam, Amir Mohammad Adibi
R3,600 Discovery Miles 36 000 Ships in 18 - 22 working days

To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Social media is a useful tool for developing the relationships between businesses and consumers. Building Brand Identity in the Age of Social Media: Emerging Research and Opportunities is a critical scholarly resource that examines the media consumption and habits of consumers to evaluate the challenges of brand building. Featuring coverage on a broad range of topics such as brand identity, brand loyalty, and social media branding, this book is geared towards marketing professionals, business managers, and individuals interested in how social media fits into today's marketing environments.

Big Data-Enabled Internet of Things (Hardcover): Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya Big Data-Enabled Internet of Things (Hardcover)
Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya
R3,548 R3,200 Discovery Miles 32 000 Save R348 (10%) Ships in 18 - 22 working days

The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.

Enterprise Level Security 1 & 2 (Paperback): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Paperback)
Kevin Foltz, William R. Simpson
R1,418 Discovery Miles 14 180 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover): Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover)
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Enterprise Information Systems (EIS) allow for the sharing and coordination of information across an organization. Given the global nature of today's business, it has become necessary to develop strategic alliances and promote inter-organizational communication. This collection, entitled Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments, provides a comprehensive assessment of the latest developments in the EIS revolution. Individual chapters, which focus on Enterprise Resource Planning (ERP) adoption, the integration of enterprise systems, personalized ERP, and the Semantic Web, offer ideas and solutions for the future of the global enterprise.

The Expert Guide to PeopleSoft Security (Hardcover): Jason Carter The Expert Guide to PeopleSoft Security (Hardcover)
Jason Carter
R662 R591 Discovery Miles 5 910 Save R71 (11%) Ships in 18 - 22 working days

Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you. The Expert Guide to PeopleSoft Security provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. The Expert Guide to PeopleSoft Security provides knowledge and insight for Administrators, Managers, Developers and Users alike. success, including: Security Design, User Profile Setup, Role & Permission List Setup, Process Security, Query Security, Row Level Security (for HR and Financials), Portal Security, Security Migrations, Definition Security, LDAP Authentication, Password Controls, Dynamic Role Creation and more. Additionally it provides an indispensable reference to PeopleSoft Security Tables as well as SQL scripts to query the security information most requested from the system. All in all The Expert Guide to PeopleSoft Security provides a comprehensive look at one of the most misunderstood but essential parts of the PeopleSoft System. Is your system properly secured?

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Multisensory Experiences - Where the…
Carlos Velasco, Marianna Obrist Hardcover R1,169 Discovery Miles 11 690
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670

 

Partners