0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (327)
  • R250 - R500 (866)
  • R500+ (14,046)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

QoS in Packet Networks (Hardcover): Kun I. Park QoS in Packet Networks (Hardcover)
Kun I. Park
R2,891 Discovery Miles 28 910 Ships in 10 - 15 working days

QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its analysis involves such mathematical disciplines as probability, random variables, stochastic processes and queuing. These mathematical subjects are abstract, not easy to grasp for uninitiated persons.

QoS in Packet Networks is written with two objectives. The first explains the fundamental mathematical concepts used in QoS analysis as plainly as possible, in layman's terms to afford the reader a better appreciation of the subject of QoS treated in this book. The second explains in plain language, the various parts of QoS in packet networks, to provide the reader with a complete view of this complex and dynamic area of communications networking technology. Discussion of the functional requirements of the packet networks to provide QoS is included.

CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition): Wm.... CSSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition (Paperback, 3rd edition)
Wm. Arthur Conklin, Daniel Shoemaker
R1,130 Discovery Miles 11 300 Ships in 12 - 17 working days

Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the exam CSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certification Consortium (ISC) (R). Thoroughly revised and updated for the latest exam release, this guide includes real-world examples and comprehensive coverage on all aspects of application security within the entire software development lifecycle. It also includes hands-on exercises, chapter review summaries and notes, tips, and cautions that provide real-world insight and call out potentially harmful situations. With access to 350 exam questions online, you can practice either with full-length, timed mock exams or by creating your own custom quizzes by chapter or exam objective. CSSLP Certification All-in-One Exam Guide, Third Edition provides thorough coverage of all eight exam domains: Secure Software Concepts Secure Software Requirements Secure Software Design Secure Software Implementation Programming Secure Software Testing Secure Lifecycle Management Software Deployment, Operations, and Maintenance Supply Chain and Software Acquisition

AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.): Prasant Mohapatra, Srikanth Krishnamurthy AD HOC NETWORKS - Technologies and Protocols (Hardcover, 2005 ed.)
Prasant Mohapatra, Srikanth Krishnamurthy
R4,377 Discovery Miles 43 770 Ships in 10 - 15 working days

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area.

AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.

Network Intrusion Detection and Prevention - Concepts and Techniques (Hardcover, 2010 ed.): Ali A. Ghorbani, Wei Lu, Mahbod... Network Intrusion Detection and Prevention - Concepts and Techniques (Hardcover, 2010 ed.)
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
R4,116 Discovery Miles 41 160 Ships in 12 - 17 working days

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,918 Discovery Miles 49 180 Ships in 12 - 17 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Creative Urban Regions - Harnessing Urban Technologies to Support Knowledge City Initiatives (Hardcover): Tan Yigitcanlar,... Creative Urban Regions - Harnessing Urban Technologies to Support Knowledge City Initiatives (Hardcover)
Tan Yigitcanlar, Koray Velibeyoglu, Scott Baum
R4,913 Discovery Miles 49 130 Ships in 12 - 17 working days

In a knowledge economy urban form and functions are primarily shaped by global market forces rather than urban planning. As the role of knowledge in wealth creation becomes a critical issue in cities, urban administrations and planners need to discover new approaches to harness the considerable opportunities of abstract production for a global order. ""Creative Urban Regions"" explores the utilization of urban technology to support knowledge city initiatives, providing scholars and practitioners with essential fundamental techniques and processes for the successful integration of information technologies and urban production. Converging timely research on a multitude of cutting-edge urban information communication technology issues, this ""Premier Reference Source"" will make a valuable addition to every reference library.

AWS CloudTrail User Guide (Hardcover): Documentation Team AWS CloudTrail User Guide (Hardcover)
Documentation Team
R1,283 Discovery Miles 12 830 Ships in 10 - 15 working days
Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R540 Discovery Miles 5 400 Ships in 10 - 15 working days
Network Management in Wired and Wireless Networks (Hardcover, 2002 ed.): Tejinder S. Randhawa, Stephen Hardy Network Management in Wired and Wireless Networks (Hardcover, 2002 ed.)
Tejinder S. Randhawa, Stephen Hardy
R4,450 Discovery Miles 44 500 Ships in 12 - 17 working days

This title addresses various open issues related to performance monitoring, performance management and performance control. It covers the performance management aspects of broadband wired and wireless cellular networks in an integrated fashion, and highlights the role of performance management in assisting network control procedures.

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,345 Discovery Miles 53 450 Ships in 12 - 17 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

CompTIA Linux+ Study Guide - Exam XK0-005 (Paperback, 5th Edition): Richard Blum, Christine Bresnahan CompTIA Linux+ Study Guide - Exam XK0-005 (Paperback, 5th Edition)
Richard Blum, Christine Bresnahan
R1,201 R1,103 Discovery Miles 11 030 Save R98 (8%) Ships in 12 - 17 working days

The best-selling, hands-on roadmap to acing the new Linux+ exam In the newly updated Fifth Edition of CompTIA Linux+ Study Guide: Exam XK0-005, IT industry veterans and tech education gurus Richard Blum and Christine Bresnahan deliver a concise and practical blueprint to success on the CompTIA Linux+ exam and in your first role as a Linux network or system administrator. In the book, you'll find concrete strategies and proven techniques to master Linux system management, security, scripting, containers, automation, and troubleshooting. Every competency tested on the Linux+ exam is discussed here. You'll also get: Hands-on Linux advice that ensures you're job-ready on the first day of your new network or sysadmin role Test-taking tips and tactics that decrease exam anxiety and get you ready for the challenging Linux+ exam Complimentary access to the Sybex learning environment, complete with online test bank, bonus practice exams, electronic flashcards, and a searchable glossary Perfect for practicing network and system admins seeking an in-demand and valuable credential for working with Linux servers and computers, CompTIA Linux+ Study Guide: Exam XK0-005, Fifth Edition, will also earn a place in the libraries of people looking to change careers and start down an exciting new path in tech.

Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover)
Information Reso Management Association
R10,649 Discovery Miles 106 490 Ships in 10 - 15 working days
Telecommunication Networks - Trends and Developments (Hardcover): Mohammad Abdul Matin Telecommunication Networks - Trends and Developments (Hardcover)
Mohammad Abdul Matin
R3,317 Discovery Miles 33 170 Ships in 10 - 15 working days
Computer-Mediated Communication across Cultures - International Interactions in Online Environments (Hardcover, New): Kirk St.... Computer-Mediated Communication across Cultures - International Interactions in Online Environments (Hardcover, New)
Kirk St. Amant, Sigrid Kelsey
R5,338 Discovery Miles 53 380 Ships in 12 - 17 working days

Over one billion people access the Internet worldwide, and new problems of language, security, and culture accompany this new excess in access. Computer-Mediated Communication across Cultures: International Interactions in Online Environments provides readers with the foundational knowledge needed to communicate safely and effectively with individuals from other countries and cultures via online media. Through a closer examination of the expanded global access to the Web, this book discusses the use and design of cross-cultural digital media and the future of the field for executives, marketers, researchers, educators, and the average user.

Computer Networking: A Top-Down Approach, Global Edition (Paperback, 8th edition): James Kurose, Keith Ross Computer Networking: A Top-Down Approach, Global Edition (Paperback, 8th edition)
James Kurose, Keith Ross
R2,366 R1,933 Discovery Miles 19 330 Save R433 (18%) Ships in 12 - 17 working days

This print textbook is available for students to rent for their classes. The Pearson print rental program provides students with affordable access to learning materials, so they come to class ready to succeed. A top-down, layered approach to computer networking. Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors' long tradition of teaching this complex subject through a layered approach in a "top-down manner." The text works its way from the application layer down toward the physical layer, motivating students by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for students in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. The 8th Edition has been updated to reflect the most important and exciting recent advances in networking, including the importance of software-defined networking (SDN) and the rapid adoption of 4G/5G networks and the mobile applications they enable.

Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New): Massimo Villari, Ivona... Achieving Federated and Self-Manageable Cloud Infrastructures - Theory and Practice (Hardcover, New)
Massimo Villari, Ivona Brandic, Francesco Tusa
R5,061 Discovery Miles 50 610 Ships in 12 - 17 working days

Cloud computing presents a promising approach for implementing scalable information and communications technology systems for private and public, individual, community, and business use. Achieving Federated and Self-Manageable Cloud Infrastructures: Theory and Practice overviews current developments in cloud computing concepts, architectures, infrastructures and methods, focusing on the needs of small to medium enterprises. The topic of cloud computing is addressed on two levels: the fundamentals of cloud computing and its impact on the IT world; and an analysis of the main issues regarding the cloud federation, autonomic resource management, and efficient market mechanisms, while supplying an overview of the existing solutions able to solve them. This publication is aimed at both enterprise business managers and research and academic audiences alike.

Mobile Data Communication Systems (Hardcover): Peter Wong, David Britland Mobile Data Communication Systems (Hardcover)
Peter Wong, David Britland
R2,311 Discovery Miles 23 110 Ships in 10 - 15 working days

Brings you up to speed on mobile data system design, current and emerging wireless network and systems standards, and network architectures. Describes mobile data applications and wireless LANs, and analyzes and evaluates current technologies.

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R968 R873 Discovery Miles 8 730 Save R95 (10%) Ships in 10 - 15 working days
Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of... Heuristic Approaches for Telecommunications Network Management, Planning and Expansion - A Special Issue of the Journal of Heuristics (Hardcover, Reprinted from JOURNAL OF HEURISTICS, 6:1, 2000)
Robert Doverspike, Iraj Saniee
R2,975 Discovery Miles 29 750 Ships in 10 - 15 working days

The telecommunications industry is experiencing a worldwide explosion of growth as few other industries ever have. However, as recently as a decade ago, the bulk of telecommunications services were delivered by the traditional telephone network, for which design and analysis principles had been under steady development for over three-quarters of a century. This environment was characterized by moderate and steady growth, with an accompanying slower development of new network equipment and standardization processes. In such a near-static environment, attention was given to optimization techniques to squeeze out better profits from existing and limited future investments. To this end, forecasts of network services were developed on a regular planning cycle and networks were optimized accordingly, layer by layer, for cost-effective placement of capacity and efficient utilization. In particular, optimization was based on a fairly stable set of assumptions about the network architecture, equipment models, and forecast uncertainty. This special edition is devoted to heuristic approaches for telecommunications network management, planning, and expansion. We hope that this collection brings to the attention of researchers and practitioners an array of techniques and case studies that meet the stringent time to market' requirements of this industry and which deserve exposure to a wider audience. Telecommunications will face a tremendous challenge in the coming years to be able to design, build, and manage networks in such a rapidly evolving industry. Development and application of heuristic methods will be fundamental in our ability to meet this challenge.

Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover): Chetna Singhal, Swades De Resource Allocation in Next-Generation Broadband Wireless Access Networks (Hardcover)
Chetna Singhal, Swades De
R5,171 Discovery Miles 51 710 Ships in 12 - 17 working days

With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research on upcoming 5G technologies for next generation mobile networks, examining the various features, solutions, and challenges associated with such advances. Highlighting relevant coverage across topics such as energy efficiency, user support, and adaptive multimedia services, this book is ideally designed for academics, professionals, graduate students, and professionals interested in novel research for wireless innovations.

Amazon CloudSearch Developer Guide (Hardcover): Documentation Team Amazon CloudSearch Developer Guide (Hardcover)
Documentation Team
R1,862 Discovery Miles 18 620 Ships in 10 - 15 working days
Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover): Manish Gupta, Raj Sharman Social and Human Elements of Information Security - Emerging Trends and Countermeasures (Hardcover)
Manish Gupta, Raj Sharman
R5,314 Discovery Miles 53 140 Ships in 12 - 17 working days

"More often than not, it is becoming increasingly evident that the weakest links in the information-security chain are the people. Due an increase in information security threats, it is imperative for organizations and professionals to learn more on the human nature and social interactions behind those creating the problem. Social and Human Elements of Information Security: Emerging Trends and Countermeasures provides insightful, high-quality research into the social and human aspects of information security. A comprehensive source of the latest trends, issues, and findings in the field, this book fills the missing gap in existing literature by bringing together the most recent work from researchers in the fast and evolving field of information security."

Secure Key Establishment (Hardcover, 1st Edition.
2nd Printing. 2008): Kim-Kwang Raymond Choo Secure Key Establishment (Hardcover, 1st Edition. 2nd Printing. 2008)
Kim-Kwang Raymond Choo
R2,887 Discovery Miles 28 870 Ships in 10 - 15 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Advanced Wired and Wireless Networks (Hardcover, 2004 ed.): Tadeusz A. Wysocki, Arek Dadej, Beata J Wysocki Advanced Wired and Wireless Networks (Hardcover, 2004 ed.)
Tadeusz A. Wysocki, Arek Dadej, Beata J Wysocki
R2,899 Discovery Miles 28 990 Ships in 10 - 15 working days

Advanced Wired and Wireless Networks brings the reader a sample of recent research efforts representative of advances in the areas of recognized importance for the future Internet, such as ad hoc networking, mobility support and performance improvements in advanced networks and protocols.

Advanced Wired and Wireless Networks is structured to meet the needs of a professional audience in industry, as well as graduate-level students in computer science and engineering.

Online Business Security Systems (Hardcover, 2007 ed.): Godfried B. Williams Online Business Security Systems (Hardcover, 2007 ed.)
Godfried B. Williams
R2,569 R1,647 Discovery Miles 16 470 Save R922 (36%) Ships in 12 - 17 working days

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Rock in the Clouds - A Life Revisited
Us Army (Ret ) Col Joseph Tedeschi Hardcover R616 Discovery Miles 6 160
A Reader on Regulation
Robert Baldwin, Colin Scott, … Hardcover R4,493 Discovery Miles 44 930
No Sure Victory - Measuring U.S. Army…
Gregory A. Daddis Hardcover R1,497 Discovery Miles 14 970
Organizational Culture and Behavior…
Information Reso Management Association Hardcover R8,107 Discovery Miles 81 070
Communicating with Today's Patient…
J Desmond Paperback R1,690 Discovery Miles 16 900
The Daily Zoo Goes to Paris
Chris Ayers Paperback R389 R215 Discovery Miles 2 150
Vital Signs - An Overview
Roy Abi Zeid Daou Paperback R2,027 Discovery Miles 20 270
Explorer
Christian Grajewski Paperback R698 Discovery Miles 6 980
Golf Tourism
Simon Hudson, Louise Hudson Paperback R1,130 Discovery Miles 11 300
Tamiya XF-53 Enamel Paint - Neutral Grey
R46 Discovery Miles 460

 

Partners