0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Networked Communities - Strategies for Digital Collaboration (Hardcover): Sylvie Albert, Don Flournoy, Rolland LeBrasseur Networked Communities - Strategies for Digital Collaboration (Hardcover)
Sylvie Albert, Don Flournoy, Rolland LeBrasseur
R4,172 Discovery Miles 41 720 Ships in 18 - 22 working days

Today, information communication technologies, such as the Internet and World Wide Web, are inextricably woven into the fabric of social and economic development. These changes are happening locally as well as globally, and the impact is transformational everywhere. Networked Communities: Strategies for Digital Collaboration looks at best practices in building sustainable community development to explain not only how but why. This unique book contains extensive referencing and sophisticated analysis in the ways communities are using information communication technologies to secure a more prosperous future.

Analyzing Security, Trust, and Crime in the Digital World (Hardcover): Hamid R. Nemati Analyzing Security, Trust, and Crime in the Digital World (Hardcover)
Hamid R. Nemati
R4,837 Discovery Miles 48 370 Ships in 18 - 22 working days

In the digital era, information is the most valuable resource, and protecting one s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein."

Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019): Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu,... Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019)
Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, …
R3,336 Discovery Miles 33 360 Ships in 18 - 22 working days

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Business Data Communications and Networking - A Research Perspective (Hardcover, New): Business Data Communications and Networking - A Research Perspective (Hardcover, New)
R2,635 Discovery Miles 26 350 Ships in 18 - 22 working days

The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. ""Business Data Communications and Networking: A Research Perspective"" addresses the key issues for businesses utilizing data communications and the increasing importance of networking technologies in business. ""Business Data Communications and Networking: A Research Perspective"" covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and centers on the issues of network-based applications, mobility, wireless networks, and network security.

Writing in a Milieu of Utility - The Move to Technical Communication in American Engineering Programs, 1850-1950, 2nd Edition... Writing in a Milieu of Utility - The Move to Technical Communication in American Engineering Programs, 1850-1950, 2nd Edition (Hardcover, 2nd Revised edition)
Teresa Kynell
R2,214 R2,045 Discovery Miles 20 450 Save R169 (8%) Ships in 10 - 15 working days

This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.

Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020): Shiho Kim, Ganesh Chandra Deka Advanced Applications of Blockchain Technology (Hardcover, 1st ed. 2020)
Shiho Kim, Ganesh Chandra Deka
R4,639 Discovery Miles 46 390 Ships in 10 - 15 working days

This contributed volume discusses diverse topics to demystify the rapidly emerging and evolving blockchain technology, the emergence of integrated platforms and hosted third-party tools, and the development of decentralized applications for various business domains. It presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of as well as the hindrances to this technology.

When Compressive Sensing Meets Mobile Crowdsensing (Hardcover, 1st ed. 2019): Linghe Kong, Bowen Wang, Guihai Chen When Compressive Sensing Meets Mobile Crowdsensing (Hardcover, 1st ed. 2019)
Linghe Kong, Bowen Wang, Guihai Chen
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.

Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up... Blogging 2020 - An Essential Guide to Marketing Your Blog and Making Money Online from It, Including Tips for Setting Up Multiple Streams of Passive Income Using Affiliate Marketing and More (Hardcover)
Matthew Shields
R685 R614 Discovery Miles 6 140 Save R71 (10%) Ships in 18 - 22 working days
Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover): Organizational Advancements Through Enterprise Information Systems - Emerging Applications and Developments (Hardcover)
R4,615 Discovery Miles 46 150 Ships in 18 - 22 working days

Enterprise Information Systems (EIS) allow for the sharing and coordination of information across an organization. Given the global nature of today's business, it has become necessary to develop strategic alliances and promote inter-organizational communication. This collection, entitled Organizational Advancements through Enterprise Information Systems: Emerging Applications and Developments, provides a comprehensive assessment of the latest developments in the EIS revolution. Individual chapters, which focus on Enterprise Resource Planning (ERP) adoption, the integration of enterprise systems, personalized ERP, and the Semantic Web, offer ideas and solutions for the future of the global enterprise.

Computer Networking for Beginners - Your Guide for Mastering Computer Networking, Cisco IOS and the OSI Model (Paperback):... Computer Networking for Beginners - Your Guide for Mastering Computer Networking, Cisco IOS and the OSI Model (Paperback)
Ramon Nastase
R320 Discovery Miles 3 200 Ships in 18 - 22 working days
Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019): K. Erciyes Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019)
K. Erciyes
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.

Spectrums Wars - The Policy and Technology Debate (Hardcover): Jennifer A. Manner Spectrums Wars - The Policy and Technology Debate (Hardcover)
Jennifer A. Manner
R2,198 Discovery Miles 21 980 Ships in 18 - 22 working days

Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,217 Discovery Miles 22 170 Ships in 18 - 22 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R604 Discovery Miles 6 040 Ships in 18 - 22 working days
Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications... Connectivity and Knowledge Management in Virtual Organizations - Networking and Developing Interactive Communications (Hardcover)
Cesar Camison, Daniel Palacios, Fernando Garrigos, Carlos Devece
R4,980 Discovery Miles 49 800 Ships in 18 - 22 working days

Advances in computing technology and internet-worked environments have driven profound realignments not only in the dynamics of technologically mediated interpersonal interactions but also in the way organizations engage with consumers, producers, and other businesses. Connectivity and Knowledge Management in Virtual Organizations: Networking and Developing Interactive Communications provides managers and academicians with a comprehensive review of innovations and trends in virtual organizations. Covering topics such as knowledge creation and management, virtual customer networks, e-commerce, and virtual communities this reference book offers incisive analysis of the full spectrum of technologies, applications, practices, and outcomes within this growing field.

AWS Elemental MediaLive User Guide (Hardcover): Documentation Team AWS Elemental MediaLive User Guide (Hardcover)
Documentation Team
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days
Mobile Cloud Computing - Foundations and Service Models (Paperback): Huijun Wu, Dijiang Huang Mobile Cloud Computing - Foundations and Service Models (Paperback)
Huijun Wu, Dijiang Huang
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

A Rhetoric of Electronic Communities (Hardcover, New): Tharon W. Howard A Rhetoric of Electronic Communities (Hardcover, New)
Tharon W. Howard
R2,801 R2,535 Discovery Miles 25 350 Save R266 (9%) Ships in 10 - 15 working days

This book is a study of the power to monitor what is said, authorize who may speak, and even to determine what is and is not knowable within the context of electronic discourse communities. It tests the claim that the Internet and other wide-area networking systems promote participatory democracies and may serve as agencies for communal change by enabling the formation of resisting subjectivities.

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Creating a Local Area Network in the School Library Media Center (Hardcover, New): Becky Mather Creating a Local Area Network in the School Library Media Center (Hardcover, New)
Becky Mather
R2,142 R1,884 Discovery Miles 18 840 Save R258 (12%) Ships in 10 - 15 working days

Let an award-winning school library media specialist who has implemented a local area network (LAN) in her media center help you plan this important addition to your media center while avoiding the pitfalls. This hands-on practical guide contains all the information the network novice needs to plan, fund, create, and maintain a LAN in the media center. Based on the experience of the school library media specialist who received the 1994 Follett/AASL "Microcomputer in the Media Center Award" for creating a local area network in the high school media center, this guide describes the procedures for planning, designing, funding, installing, organizing, training, evaluating, and maintaining a LAN in a library media center setting. Step-by-step nontechnical instructions and advice for creating an information network are presented in an understandable format. How to expand into a school-district wide area network (WAN) and gain access to the Internet are also discussed. This comprehensive work takes the network novice from dream to implementation, maintenance, and evaluation of a local area network. It covers funding sources, tips for writing technology grants, requests for proposals from vendors, staff inservice and student training, evaluation and assessment, student internships, technology teams, troubleshooting equipment, and network administration. Useful forms, simple network schematic diagrams, a model school-board approved electronic resources policy, a glossary of technical terms, and sample assessment tools are included. No other book walks the library media specialist through every step in creating a LAN. Media professionals who want to provide networked electronic information to thestaff and students but are not sure of how to proceed will benefit from this clear, nontechnical guide to the process.

Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover): Amir Ekhlassi, Mahdi... Building Brand Identity in the Age of Social Media - Emerging Research and Opportunities (Hardcover)
Amir Ekhlassi, Mahdi Niknejhad Moghadam, Amir Mohammad Adibi
R3,600 Discovery Miles 36 000 Ships in 18 - 22 working days

To survive in today's competitive business environment, marketing professionals must look to develop innovative methods of reaching their customers and stakeholders. Social media is a useful tool for developing the relationships between businesses and consumers. Building Brand Identity in the Age of Social Media: Emerging Research and Opportunities is a critical scholarly resource that examines the media consumption and habits of consumers to evaluate the challenges of brand building. Featuring coverage on a broad range of topics such as brand identity, brand loyalty, and social media branding, this book is geared towards marketing professionals, business managers, and individuals interested in how social media fits into today's marketing environments.

Surveillance Technologies and Early Warning Systems - Data Mining Applications for Risk Detection (Hardcover): Ali Serhan... Surveillance Technologies and Early Warning Systems - Data Mining Applications for Risk Detection (Hardcover)
Ali Serhan Koyuncugil, Nermin Ozgulbas
R4,583 Discovery Miles 45 830 Ships in 18 - 22 working days

Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection has never been more important, as the research this book presents an alternative to conventional surveillance and risk assessment. This book is a multidisciplinary excursion comprised of data mining, early warning systems, information technologies and risk management and explores the intersection of these components in problematic domains. It offers the ability to apply the most modern techniques to age old problems allowing for increased effectiveness in the response to future, eminent, and present risk.

AWS Snowball User Guide (Hardcover): Documentation Team AWS Snowball User Guide (Hardcover)
Documentation Team
R2,139 R1,716 Discovery Miles 17 160 Save R423 (20%) Ships in 18 - 22 working days
Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback):... Deception in the Digital Age - Exploiting and Defending Human Targets through Computer-Mediated Communications (Paperback)
Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
R1,559 R1,479 Discovery Miles 14 790 Save R80 (5%) Ships in 10 - 15 working days

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

Securing Critical Infrastructures and Critical Control Systems - Approaches for Threat Protection (Hardcover, New): Christopher... Securing Critical Infrastructures and Critical Control Systems - Approaches for Threat Protection (Hardcover, New)
Christopher Laing, Atta Badii, Paul Vickers
R4,981 Discovery Miles 49 810 Ships in 18 - 22 working days

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao Paperback R3,249 R2,814 Discovery Miles 28 140
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Modern Cryptography - Current Challenges…
Menachem Domb Hardcover R3,059 Discovery Miles 30 590
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Research Anthology on Architectures…
Information R Management Association Hardcover R12,630 Discovery Miles 126 300
Understanding PKI - Concepts, Standards…
Carlisle Adams, Steve Lloyd Paperback R2,283 Discovery Miles 22 830
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520

 

Partners