0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,586)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Handbook of Research on Contemporary Theoretical Models in Information Systems (Hardcover): Yogesh K. Dwivedi, Banita Lal, M.... Handbook of Research on Contemporary Theoretical Models in Information Systems (Hardcover)
Yogesh K. Dwivedi, Banita Lal, M. D. Williams, Scott L Schneberger
R6,771 Discovery Miles 67 710 Ships in 18 - 22 working days

Theory is considered to be the bedrock of academic research, often being viewed as the foundation upon which scientific enquiry is organized and built. Despite its ubiquity throughout information systems research, there is much that remains unknown about theory. The Handbook of Research on Contemporary Theoretical Models in Information Systems provides a comprehensive overview and coverage of various theories, models, and related approaches used within information systems research. A defining collection of field advancements, this Handbook of Research offers examples and descriptions of real-world applications of various theories based on empirical studies.

Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019): Song Guo, Deze Zeng Cyber-Physical Systems: Architecture, Security and Application (Hardcover, 1st ed. 2019)
Song Guo, Deze Zeng
R3,805 Discovery Miles 38 050 Ships in 18 - 22 working days

This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy

Chaotic Secure Communication - Principles and Technologies (Hardcover): Kehui Sun Chaotic Secure Communication - Principles and Technologies (Hardcover)
Kehui Sun; Contributions by Tsinghua University Press
R3,653 Discovery Miles 36 530 Ships in 10 - 15 working days

The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the methodologies and technologies in secure communication system design and implementation. The author combines theoretical frameworks with empirical studies, making the book a pratical reference for both academics and industrial engineers.

Propagation Engineering in Wireless Communications (Hardcover, 2nd ed. 2016): Abdollah Ghasemi, Ali Abedi, Farshid Ghasemi Propagation Engineering in Wireless Communications (Hardcover, 2nd ed. 2016)
Abdollah Ghasemi, Ali Abedi, Farshid Ghasemi
R4,662 R3,591 Discovery Miles 35 910 Save R1,071 (23%) Ships in 10 - 15 working days

This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.

Computer and Intrusion Forensics (Hardcover): George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish Computer and Intrusion Forensics (Hardcover)
George Mohay, Alison Anderson, Byron Collie, Oliver de Vel, Rodney D. McKemmish
R2,583 Discovery Miles 25 830 Ships in 18 - 22 working days

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.

Privacy Solutions and Security Frameworks in Information Protection (Hardcover): Hamid R. Nemati Privacy Solutions and Security Frameworks in Information Protection (Hardcover)
Hamid R. Nemati
R4,922 Discovery Miles 49 220 Ships in 18 - 22 working days

While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.

Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in... Critical Infrastructure Protection Research - Results of the First Critical Infrastructure Protection Research Project in Hungary (Hardcover, 1st ed. 2016)
Laszlo Nadai, Jozsef Padanyi
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.

Enabling the Internet of Things - From Integrated Circuits to Integrated Systems (Hardcover, 1st ed. 2017): Massimo Alioto Enabling the Internet of Things - From Integrated Circuits to Integrated Systems (Hardcover, 1st ed. 2017)
Massimo Alioto
R4,897 Discovery Miles 48 970 Ships in 18 - 22 working days

This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).

Asynchronous Transfer Mode Networks - Proceedings of TRICOMM '93 Held in Raleigh, North Carolina, April 20-22, 1993... Asynchronous Transfer Mode Networks - Proceedings of TRICOMM '93 Held in Raleigh, North Carolina, April 20-22, 1993 (Hardcover)
Yannis Viniotis, Raif O. Onvural
R2,436 Discovery Miles 24 360 Ships in 18 - 22 working days

Some Obstacles on the Road to ATM; D. Abensour, L. Felton. Electropolitical Correctness and High Speed Networking, or, Why ATM Is Like a Nose; D. Stevenson. An Overview of the ATM Forum and the Traffic Management Activities; L. Gun, G.A. Marin. Communication Subsystems for High Speed Networks; D.N. Serpanos. SMDS and Frame Relay; J.P. Bernoux. ATM Systems in Support of BISDN, Frame Relay, and SMDS Services; P. Holzworth. Approaching BISDN; C. Bisdikian, et al. On Transport Systems for ATM Networks; M. Zitterbart, et al. XTP Bucket Error Control; S. Fdida, H. Santoso. Congestion Control Mechanisms for ATM Networks; D.S. Holtsinger. Highly-Bursty Sources and their Admission Control in ATM Networks; K. Sohraby. A User Relief Approach to Congestion Control in ATM Networks; I. Stavrakakis, et al. Space Priority Buffer Management; D. Tipper, et al. 4 additional articles. Index.

Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover): Maurice Dawson, Mohamed Eltayeb, Marwan Omar Security Solutions for Hyperconnectivity and the Internet of Things (Hardcover)
Maurice Dawson, Mohamed Eltayeb, Marwan Omar
R5,374 Discovery Miles 53 740 Ships in 18 - 22 working days

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks. Calling for revolutionary protection strategies to reassess security, this book is an essential resource for programmers, engineers, business professionals, researchers, and advanced students in relevant fields.

Cloud Computing: Security and Management (Hardcover): Conor Suarez Cloud Computing: Security and Management (Hardcover)
Conor Suarez
R3,167 R2,870 Discovery Miles 28 700 Save R297 (9%) Ships in 18 - 22 working days
Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover): Network Science for Military Coalition Operations - Information Exchange and Interaction (Hardcover)
R4,577 Discovery Miles 45 770 Ships in 18 - 22 working days

Modern military coalition operations rely on the ability of multiple independently developed networks to function cohesively, allowing information collected by different sources to be transmitted, analyzed, processed, and provided to troops involved in tactical operations. Network Science for Military Coalition Operations: Information Exchange and Interaction presents an advanced view of this delicate and vital operation. However, an understanding of the science behind coalition operations can benefit not just military operations, but any context in the modern world where two independent organizations need to collaborate together for a shared goal. In this age of globalization, the research in this book becomes of unprecedented importance, not only for the military, where most stable and advance techniques are required, but also for society at large, which also demands constant improvement in network science.

Smart Grids and Their Communication Systems (Hardcover, 1st ed. 2019): Ersan Kabalci, Yasin Kabalci Smart Grids and Their Communication Systems (Hardcover, 1st ed. 2019)
Ersan Kabalci, Yasin Kabalci
R5,953 Discovery Miles 59 530 Ships in 18 - 22 working days

The book presents a broad overview of emerging smart grid technologies and communication systems, offering a helpful guide for future research in the field of electrical engineering and communication engineering. It explores recent advances in several computing technologies and their performance evaluation, and addresses a wide range of topics, such as the essentials of smart grids for fifth generation (5G) communication systems. It also elaborates the role of emerging communication systems such as 5G, internet of things (IoT), IEEE 802.15.4 and cognitive radio networks in smart grids. The book includes detailed surveys and case studies on current trends in smart grid systems and communications for smart metering and monitoring, smart grid energy storage systems, modulations and waveforms for 5G networks. As such, it will be of interest to practitioners and researchers in the field of smart grid and communication infrastructures alike.

Corporate Networks - Strategic Use of Telecommunications (Hardcover): Thomas Valovic Corporate Networks - Strategic Use of Telecommunications (Hardcover)
Thomas Valovic
R2,447 Discovery Miles 24 470 Ships in 18 - 22 working days

An in-depth analysis of how the Fortune 1000 companies have dealt with the strategic use of computers and communications, what applications have been successful and which have faltered, and how upcoming technologies will provide the foundation for a new generation of strategic applications.

Combating Spyware in the Enterprise - Discover, Detect, and Eradicate the Internet's Greatest Threat (Paperback): Paul... Combating Spyware in the Enterprise - Discover, Detect, and Eradicate the Internet's Greatest Threat (Paperback)
Paul Piccard
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.
Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware s ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware s intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.
* A recent survey published by Information Security Magazine stated that "combating spyare" was the #2 priority for security professionals in 2005
* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors"

Data Communications & Networks - An Engineering Approach (Hardcover): J. Irvine Data Communications & Networks - An Engineering Approach (Hardcover)
J. Irvine
R1,892 Discovery Miles 18 920 Ships in 18 - 22 working days

Data Communications and Networks uses a top-down, Internet-focussed approach to tackle the problem of communication system design. An integrated approach is taken to networks and data communications, with an emphasis that starts from the top level requirements and works downwards, describing how such requirements are fulfilled by lower layers of the transmission chain. While the book contains sufficient detail to provide an excellent foundation, clarity is paramount and care is taken not to swamp the reader with information to the point where the underlying concepts are obscured.

The Internet is used as the principle example of a communication system, allowing the reader to follow the system from the application layers, with source coding and security, through the network, with naming and routing algorithms, down to transport and physical aspects of a communication system. Modern techniques such as mobile radio, Voice over IP, and ASDL, are covered, while more traditional aspects such as circuit switching, which still form a significant part of current systems, are not overlooked.

By providing a technical introduction and including application examples, this text will have significant appeal to final year students, postgraduates and professionals with a science or engineering background wishing to gain a basic understanding of the key concepts behind data communications engineering.

A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition): Floyd Wilder A Guide to the TCP/IP Protocol Suite (Hardcover, 2nd Revised edition)
Floyd Wilder
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

This guide to all the major protocols of a TCP/IP-based network includes an introduction to binary and hexadecimal arithmetic and coverage of L2TP, LAN analysis screens and engineering-level detail on IPv6 routing. The second edition also features: an enhanced description of IP, including IPv6, plus examples of dynamic routing such as RIPv2, OSPF, BGP, NAT and CIDR; enhanced descriptions of ARP, RARP and BOOTP, with added descriptions of IARP, DHCP and RADIUS; a revised description of FTP; and an added description of HTTP.

Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover): J. M. Pierson Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover)
J. M. Pierson
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

Addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green networking (both wired and wireless), mobile computing, power modeling, the rise of green data centers and high-performance computing, resource allocation, and energy efficiency in peer-to-peer (P2P) computing networks. Discusses measurement and modeling of the energy consumption method Includes methods for energy consumption reduction in diverse computing environments Features a variety of case studies and examples of energy reduction and assessment Timely and important, Large-Scale Distributed Systems and Energy Efficiency is an invaluable resource for ways of increasing the energy efficiency of computing systems and networks while simultaneously reducing the carbon footprint.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Amazon Glacier Developer Guide (Hardcover): Documentation Team Amazon Glacier Developer Guide (Hardcover)
Documentation Team
R1,977 Discovery Miles 19 770 Ships in 18 - 22 working days
The Role of SDN in Broadband Networks (Hardcover, 1st ed. 2017): Hassan Habibi Gharakheili The Role of SDN in Broadband Networks (Hardcover, 1st ed. 2017)
Hassan Habibi Gharakheili
R3,172 Discovery Miles 31 720 Ships in 18 - 22 working days

This thesis focuses on the design and use of software defined networking (SDN) in residential Internet service providers (ISPs), as well as innovative operational models that can be incorporated in broadband ecosystems. Though SDN addresses the challenges for bundled best-effort service provided by broadband operators for users, it does not distinguish between the different types of applications (video streaming, web-browsing, and large file transfers), nor does it cater to the varying needs of different household devices (entertainment tablets, work laptops, or connected appliances). This is a problem for end-users, who want to differentiate between applications and devices; for content providers (CPs), who want to exercise control over streams of high monetary value; and for Internet service providers (ISPs), who have to accommodate growing traffic volumes without additional revenues. This book develops a series of solution techniques that use SDN to find an optimal balance between the competing requirements of end-users, ISPs, and CPs. In addition to the design and discussions of various architectures, it provides technical details on real-world system implementations and prototypes. As such, it offers a valuable resource for researchers, network architects, network strategists, developers, and all other readers seeking to learn more about the practical value of SDN in future ISP networks.

IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover): Lazarus Ndiku Makewa, Baraka Manjale Ngussa IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover)
Lazarus Ndiku Makewa, Baraka Manjale Ngussa
R4,585 Discovery Miles 45 850 Ships in 18 - 22 working days

Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how the IT systems are established and maintained. The design, development, management, utilization, and evaluation of these IT systems will be necessary for the university to operate successfully. IT Issues in Higher Education: Emerging Research and Opportunities is a pivotal reference source that provides vital research on the integration and management of information technology in higher education with a focus on issues of security, data management, student access to information, and staff competency. This publication explores present-day educational environments as well as educators' methods of applying technology to student success and highlights topics that include personal devices and institutional culture. It is ideally designed for academic professionals, lecturers, students, professors, IT experts, instructional designers, curriculum developers, administrators, higher education faculty, researchers, and policymakers.

Security in Fixed and Wireless Networks 2e (Hardcover, 2nd Edition): G. Schaefer Security in Fixed and Wireless Networks 2e (Hardcover, 2nd Edition)
G. Schaefer
R2,995 Discovery Miles 29 950 Ships in 10 - 15 working days

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.

Data Networks - Routing, Security, and Performance Optimization (Paperback): Tony Kenyon Data Networks - Routing, Security, and Performance Optimization (Paperback)
Tony Kenyon
R2,534 Discovery Miles 25 340 Ships in 10 - 15 working days

Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for day-to-day problems facing network designers and IT managers. In this book, you will find optimization advice from an experienced practitioner that you can put to work in your own system.
As security and network performance become more and more critical to a company's success, the system administrator's job becomes even more difficult. Use the principles, tips, and techniques Kenyon offers here to enhance and protect the flow of data within your enterprise.
-Covers Addressing, Routing, Multicasting, and Quality of Service (QoS) design for enterprise network design.
-Extensive coverage on relevant Security Technologies and Virtual Private Network (VPN) implementation
-Provides advanced coverage on Risk Assessment, Availability Analysis, Fault Tolerance, Disaster Recovery, and Network Optimization.

Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021): Hanen Idoudi, Thierry Val Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021)
Hanen Idoudi, Thierry Val
R4,635 Discovery Miles 46 350 Ships in 10 - 15 working days

The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
The Gathering Cloud
J. R. Carpenter Paperback R396 Discovery Miles 3 960
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830

 

Partners