0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (281)
  • R250 - R500 (873)
  • R500+ (13,612)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

The Age of You - How to Understand and Benefit from Social Media and the Connected Society (Hardcover): Stein Arne Nistad The Age of You - How to Understand and Benefit from Social Media and the Connected Society (Hardcover)
Stein Arne Nistad
R755 Discovery Miles 7 550 Ships in 10 - 15 working days

"The age of You" is about our new society and how we all breaks away from established rules about communication, relationships and the way we do business. Its also the history about a major shift: Increasingly, we take control over our personal and commercial relationships, we decide who we want to listen to, and how we want to engage ourselves. The book is explaining the historical development, concepts and the foundation of networks, relations, social media and the new connected society, as well as practical strategic guidelines to benefit from it. By using historical events, storytelling, models and case studies, the book is a thrilling story about YOU and how to succeed in the connected society. Storytelling in a connected society unlocks the need for new models and approaches. Here, the author gives us a deeper understanding of the challenges ahead and what we need to do to effectively connect with and earn relevance within society. Brian Solis, author of What's the Future of Business Really interesting. There is a major need for this type of literature. Anne Grethe Solberg, Sociologist and Doctor PH. D. The last year I have read almost everything about the subject. This is by far the best book on social media. Inger Line Skjerve, Master student (BI):

Amazon Transcribe Developer Guide (Hardcover): Documentation Team Amazon Transcribe Developer Guide (Hardcover)
Documentation Team
R881 Discovery Miles 8 810 Ships in 18 - 22 working days
Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Wireless Sensor Networks (Hardcover): Kevin Merriman Wireless Sensor Networks (Hardcover)
Kevin Merriman
R3,243 R2,938 Discovery Miles 29 380 Save R305 (9%) Ships in 18 - 22 working days
Networking in the Internet Age (Hardcover): A. Dennis Networking in the Internet Age (Hardcover)
A. Dennis
R6,274 Discovery Miles 62 740 Ships in 18 - 22 working days

This text is appropriate for those courses with an emphasis on e-commerce and the Internet, as well as short courses or MBA/IS courses that want a modern approach. Networking has changed dramatically over the past ten years. Most texts have focused on network layers and their concepts and then on how the different technologies are implemented; however with the number of viable technologies shrinking, it makes less sense to focus on concepts first and technologies second. Networking in the Internet Age first edition integrates the discussion of concepts and technologies so they appear in one place, organized by layers.

Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover): T.J. Grant, R. H. P. Janssen, H.... Network Topology in Command and Control - Organization, Operation, and Evolution (Hardcover)
T.J. Grant, R. H. P. Janssen, H. Monsuur
R5,423 Discovery Miles 54 230 Ships in 18 - 22 working days

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.

WLAN Systems and Wireless IP for Next Generation Communications (Hardcover): Neeli Prasad, Anand Prasad WLAN Systems and Wireless IP for Next Generation Communications (Hardcover)
Neeli Prasad, Anand Prasad
R3,165 Discovery Miles 31 650 Ships in 18 - 22 working days

The continuing growth of wireless networks is being driven by ease of installation, flexibility and mobility, offering gains in efficiency, accuracy and lower business costs. This fresh perspective from two experts in the field provides professionals with a practical approach to design implementation, evaluation and problem-solving, which underscores its uniqueness as a hands-on guide to next generation wireless communications systems. The book offers practitioners a wealth of information on WLAN (wireless local area network) implementation, deployment and results. Key topics include: IP networking for wireless; wireless networking and Internet access standards; changes in the IEEE 802.11 standard; system design and implementation; and performance analysis.

Big Data Applications in the Telecommunications Industry (Hardcover): Ye Ouyang, Mantian Hu Big Data Applications in the Telecommunications Industry (Hardcover)
Ye Ouyang, Mantian Hu
R3,661 Discovery Miles 36 610 Ships in 18 - 22 working days

The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data

Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information... Handbook of Research on E-government Readiness for Information and Service Exchange - Utilizing Progressive Information Communication Technologies (Hardcover, New)
Hakikur Rahman
R7,428 Discovery Miles 74 280 Ships in 18 - 22 working days

Rapid advancements in technology have enabled the use of information and communication technologies to exchange and disseminate data and services with citizens, businesses, civil society, and other arms of government. ""The Handbook of Research on E-Government Readiness for Information and Service Exchange: Utilizing Progressive Information Communication Technologies"" formulates leading ICT strategies and critical comprehensive research for the development of efficient and effective e-government systems. This innovative collection provides cutting-edge knowledge to researchers and academicians with in-depth analysis of diversified approaches and patterns.

CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition): Mike... CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) (Hardcover, 11th edition)
Mike Meyers, Travis Everett, Andrew Hutz
R1,285 Discovery Miles 12 850 Ships in 10 - 15 working days

This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover): S Geetha, Asnath Victy... Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (Hardcover)
S Geetha, Asnath Victy Phamila
R5,575 Discovery Miles 55 750 Ships in 18 - 22 working days

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security. Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R604 Discovery Miles 6 040 Ships in 18 - 22 working days
AWS Elemental MediaLive User Guide (Hardcover): Documentation Team AWS Elemental MediaLive User Guide (Hardcover)
Documentation Team
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days
Examining Cloud Computing Technologies Through the Internet of Things (Hardcover): Pradeep Tomar, Gurjit Kaur Examining Cloud Computing Technologies Through the Internet of Things (Hardcover)
Pradeep Tomar, Gurjit Kaur
R5,366 Discovery Miles 53 660 Ships in 18 - 22 working days

The progressive combination of cloud computing and Internet of Things (IoT) will enable new monitoring services, create powerful processing of sensory data streams, and provide a new method for intelligent perception and connection. Examining Cloud Computing Technologies Through the Internet of Things is a pivotal reference source for scholarly research on the latest and innovative facets of cloud-based Internet of Things systems including technical evaluations and comparisons of existing concepts. Featuring coverage on a broad range of topics such as fog computing, network programming, and data security, this book is geared towards advanced-level students, researchers, and professionals interested in exploring and implementing the IoT and related technologies.

Big Data-Enabled Internet of Things (Hardcover): Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya Big Data-Enabled Internet of Things (Hardcover)
Muhammad Usman Shahid Khan, Samee U. Khan, Albert Y. Zomaya
R3,548 R3,200 Discovery Miles 32 000 Save R348 (10%) Ships in 18 - 22 working days

The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.

Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print,... Notebook - A cute and discrete password book to keep your log in details safe and close at hand at all times (Large print, Hardcover, Large type / large print edition)
Faith V Summers
R471 Discovery Miles 4 710 Ships in 18 - 22 working days
VSAT Networks (Hardcover, 2nd Edition): G. Maral VSAT Networks (Hardcover, 2nd Edition)
G. Maral
R3,718 Discovery Miles 37 180 Ships in 18 - 22 working days

Now fully revised and updated, "VSAT Networks" continues to cover all of the essential issues involved with the installation and operation of networks of small earth stations called 'Very Small Aperture Terminal'. VSATs are typically one to two meters in antenna reflector diameter and communicate with one another, or with a central earth station called a 'hub', via a relay satellite in space. This informative volume enables the reader to understand how services, economics and regulatory aspects condition the success of such networks.

Key features include: configuration and practical applications of VSAT networks radio frequency (RF) link analysis, focusing on basic formulae and the evaluation of the RF link performance protocols used, with emphasis on the necessary adaptation of protocols used in terrestrial networks procedures for the dimensioning of the network according to the type and volume of generated traffic and to the expected quality of service

Written by a well-known, highly respected academic, this authoritative volume will appeal to students of telecommunications, electronics and computer science. Practising telecommunications engineers and technical managers involved in the planning, design and operation of networks and service provision will all find this book a valuable reference source.

This "Second Edition" has taken full advantage of the author's experience gained from the success of the first edition. The theoretical background has been expanded and the operational contents have been updated in view of recent developments in the field.

Current Trends in Cyber Security (Hardcover): Neil Kent, Irina du Quenoy Current Trends in Cyber Security (Hardcover)
Neil Kent, Irina du Quenoy
R4,430 Discovery Miles 44 300 Ships in 18 - 22 working days

This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors-all leaders in their fields-have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify patterns of analytical error that may guide security officials and policymakers as they examine the issue of cyber security before them today. French military academy instructor Thomas Flichy de La Neuville suggests another historical parallel, locating an important precursor to current debates about internet freedom in the waning control of information during the French Revolution. Italian academics Alessandro Guarino and Emilio Iasiellotake up an industrial case study, that of self-driving motor vehicles, to examine how cyberthreats might effect business and industry as they become ever more dependent on technology in the twenty-first century. Finally, the Indian scholar Sushma Devi presents a national case study, that of her native India, to assess how one of the world's most dynamic emerging economies is facing up to what was originally a first world problem. This collection anticipates endless analysis of the rapidly expanding nexus of cyber security and intelligence. It will be of undoubted use to anyone concerned with technology, the security of online business presences, national security, communications, and any other field of endeavor that will benefit from the knowledge of experts in the field.

Senior Cyber - Best Security Practices for Your Golden Years (Hardcover): Scott N Schober Senior Cyber - Best Security Practices for Your Golden Years (Hardcover)
Scott N Schober; As told to Craig W Schober
R689 R618 Discovery Miles 6 180 Save R71 (10%) Ships in 18 - 22 working days
Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New): Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New)
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.

Personal Information Management - Tools and Techniques for Achieving Professional Effectiveness (Hardcover, New): Barbara Etzel Personal Information Management - Tools and Techniques for Achieving Professional Effectiveness (Hardcover, New)
Barbara Etzel
R2,850 Discovery Miles 28 500 Ships in 18 - 22 working days

Electronic mail, personal organizers, voice mail, all were introduced as time-saving devices designed to promote an easier and more efficient workplace. Yet many professionals find that making effective use of these new forms of communication technology can become a time-consuming task. In this handbook written for the office of the 21st century, Barbara Etzel and Peter J. Thomas provide guidance for those struggling to manage the growing volume of mail, memos, e-mail messages, and electronic documents that arrives daily.

Personal Information Management details the skills professionals need to process this information, save time, and work more effectively. Etzel and Thomas present common organizational difficulties and enumerate concrete techniques for overcoming them. They guide the reader through a variety of computer software and hardware products, paper-based information products, and personal time management techniques, helping the reader to develop and individually-tailored Personal Information Management Strategy.

Technologies covered include accounting and business software, word processors, databases, personal organizers, e-mail programs, tracking and storage packages, personal digital assistants, CD-Roms, computer backup devices, scanning device, voice mail, cellular phones, beepers, and fax machines, to name only a few. including an appendix listing the names and addresses of companies that Produce information technologies, Personal Information Technologies is essential reading for anyone suffering from information overload. Designed to be adaptable to emerging technologies, the techniques they provide will be applicable regardless for what the information age brings next.

Microsoft Outlook Programming - Jumpstart for Administrators, Developers, and Power Users (Paperback): Sue Mosher Microsoft Outlook Programming - Jumpstart for Administrators, Developers, and Power Users (Paperback)
Sue Mosher
R2,242 Discovery Miles 22 420 Ships in 10 - 15 working days

Microsoft Outlook Programming unleashes the power of Microsoft Outlook, allowing administrators and end users to customize Outlook in the same way that they've used macros and templates to customize other programs like Excel and Word. Experienced developers will find the quick-start information they need to begin integrating Outlook into their applications. Microsoft Exchange administrators will get help automating common tasks such as announcing public folders and importing data to custom forms.
Microsoft Outlook is the most widely used email program, and it offers the most programmability. This book introduces key concepts for programming both Outlook forms for storing and exchanging data and Visual Basic for Applications modules that add new features to Outlook. Central to this new edition, which covers both Outlook 2000 and Outlook 2002, is awareness of tighter security in Outlook. Designed to prevent transmission of computer viruses, the security restrictions can also get in the way of legitimate programs, but this book offers workarounds within the reach of novice programmers. It also covers many of the new features of Outlook 2002, such as the integrated Outlook View Control and searching across multiple folders using SQL syntax and the Search object.
-Building block procedures for the most common Outlook programming tasks
-Jargon-free language and practical examples to make the material more accessible to new Outlook programmers
-Coverage of Outlook Email Security Update
-Coverage of the Office XP Web Services Toolkit

Building a VoIP Network with Nortel's Multimedia Communication Server 5100 (Paperback): Larry Chaffin Building a VoIP Network with Nortel's Multimedia Communication Server 5100 (Paperback)
Larry Chaffin
R1,819 Discovery Miles 18 190 Ships in 10 - 15 working days

The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.
This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel s hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel s entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.
. If you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products, then this is the only book you need.
. It shows how you'll be able to design, build, secure, and maintaining a cutting-edge converged network to satisfy all of your business requirements
. Also covers how to secure your entire multimedia network from malicious attacks"

General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018): David Rousseau,... General Systemology - Transdisciplinarity for Discovery, Insight and Innovation (Hardcover, 1st ed. 2018)
David Rousseau, Jennifer Wilby, Julie Billingham, Stefan Blachfellner
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This book expands the foundations of general systems theory to enable progress beyond the rich heuristic practices available today. It establishes a foundational framework for the development of scientific transdisciplinary systems principles and shows how these can amplify the potential of individuals and teams working in multi-, inter- and transdisciplinary contexts or striving to translate their progress across disciplinary boundaries. Three general scientific systems principles are presented, and their relevance to the design, analysis, management and transformation of systems is explored. Applying lessons from the history and philosophy science, this book disambiguates key concepts of general systemology, clarifies the role of general systemology within the field of systemology, and explains how general systemology supports other forms of transdisciplinarity. These insights are used to develop new perspectives, strategies and tools for addressing long-standing challenges to the advancement and transdisciplinary application of general insights into the nature of complex systems.The material presented in this book includes comprehensive models of the structure of systemology as a disciplinary field, the structure and significance of the general systems worldview, and the role of general systemology as the heart of systems science, systems engineering and systems practice. It explains what a fully-fledged general theory of systems would look like, what its potential is, what routes are available to us to develop it further, and how to leverage the knowledge we have attained so far. Many examples and analogies show how general systemology has the potential to enable scientific discovery, insightful theory building, and practical innovation in all the disciplines as they study, design, nurture or transform complex systems. This book is essential reading for anyone wishing to master the concepts, terminology, models and strategies needed to make effective use of current general systems knowledge and to engage in the further development of the philosophy, science, and practice of general systemology.

AWS DeepLens Developer Guide (Hardcover): Documentation Team AWS DeepLens Developer Guide (Hardcover)
Documentation Team
R878 Discovery Miles 8 780 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lost Youngstown
Sean T Posey Paperback R509 R478 Discovery Miles 4 780
Travels in Greece and Russia With an…
Bayard Taylor Paperback R608 Discovery Miles 6 080
Autodesk Inventor 2023 Black Book…
Gaurav Verma, Matt Weber Hardcover R2,244 Discovery Miles 22 440
Harvey Houses of New Mexico: - Historic…
Rosa Latimer Paperback R501 R468 Discovery Miles 4 680
Stalking the Great Killer - Arkansas's…
Larry Floyd, Joseph H. Bates Hardcover R1,036 Discovery Miles 10 360
Funkiest Man Alive - Rufus Thomas and…
Matthew Ruddick, Rob Bowman Hardcover R1,119 Discovery Miles 11 190
Frontier History Along Idaho's…
John Bradbury Paperback R505 R473 Discovery Miles 4 730
Creo Manufacturing 9.0 Black Book…
Gaurav Verma, Matt Weber Hardcover R1,815 Discovery Miles 18 150
ETABS V20 Black Book
Gaurav Verma Hardcover R1,793 Discovery Miles 17 930
Design Theory and Methods using CAD/CAE…
Kuang-Hua Chang Hardcover R1,699 Discovery Miles 16 990

 

Partners