0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (269)
  • R250 - R500 (876)
  • R500+ (13,566)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Anonymous Security Systems and Applications - Requirements and Solutions (Hardcover, New): Shinsuke Tamura Anonymous Security Systems and Applications - Requirements and Solutions (Hardcover, New)
Shinsuke Tamura
R4,905 Discovery Miles 49 050 Ships in 18 - 22 working days

As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Frontier and Innovation in Future Computing and Communications (Hardcover, 2014): James J (Jong Hyuk) Park, Albert Zomaya, Hwa... Frontier and Innovation in Future Computing and Communications (Hardcover, 2014)
James J (Jong Hyuk) Park, Albert Zomaya, Hwa Young Jeong, Mohammad Obaidat
R7,867 Discovery Miles 78 670 Ships in 18 - 22 working days

IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.

Security and Privacy in Smart Sensor Networks (Hardcover): Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui Security and Privacy in Smart Sensor Networks (Hardcover)
Yassine Maleh, Abdellah Ezzati, Mustapha Belaissaoui
R5,399 Discovery Miles 53 990 Ships in 18 - 22 working days

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource that examines recent developments and emerging trends in smart sensor security and privacy by providing new models, practical solutions, and technological advances related to security. Featuring coverage on a broad range of topics such as cloud security, encryption, and intrusion detection systems, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on authentication and intrusion detection.

User Interface Design - A Structured Approach (Hardcover, New): Siegfried Treu User Interface Design - A Structured Approach (Hardcover, New)
Siegfried Treu
R2,453 Discovery Miles 24 530 Ships in 18 - 22 working days

Introduction: Historical Perspective. Definitions and Dependencies. Prerequisite Knowledge Areas: User Capabilities and Limitations. Computer Applications and Tasks. Computer Capabilities and Limitations. Interaction Characteristics and Options. Representation Models and Methods. Supportive Tools and Techniques. Design and Development: Design Terms and Decision Constructs. Design Approaches and Methods. Design Objects, Modules, and Models. Special-Purpose Designs: Network-Oriented Design. Adaptive Design. Index.

Business Transformation and Sustainability through Cloud System Implementation (Hardcover): Fawzy Soliman Business Transformation and Sustainability through Cloud System Implementation (Hardcover)
Fawzy Soliman
R5,075 Discovery Miles 50 750 Ships in 18 - 22 working days

Sustaining a competitive edge in today's business world requires innovative approaches to product, service, and management systems design and performance. Advances in computing technologies have presented managers with additional challenges as well as further opportunities to enhance their business models Business Transformation and Sustainability through Cloud System Implementation presents novel computing technologies designed for use in business and corporate environments, enabling managers and associates to make the most of the technologies at their disposal. This premier reference work seeks to alert firm management professionals and researchers to the potential risks and benefits associated with emerging technologies and guide firms on the proper selection, maintenance, and use of Web-based computing systems.

Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017): Mihaly Makai, Janos Vegh Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017)
Mihaly Makai, Janos Vegh
R4,641 R3,570 Discovery Miles 35 700 Save R1,071 (23%) Ships in 10 - 15 working days

This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants. It also offers a brief overview of the corresponding techniques at research and materials testing reactors. The book combines detailed descriptions of the theoretical background and fundamental underlying principles as well as the practical applications of core surveillance. It not only provides numerous industrial examples to illustrate how complex computerized systems are able to support the safe operation of nuclear reactors, but also outlines some new application areas that were made possible only by state-of-the-art computing resources. Thanks to its practical approach, it serves as a valuable and practical reference book for readers interested in the surveillance of nuclear reactors, ranging from undergraduate and postgraduate students to researchers and experts working at research reactors and nuclear power plants, as well as at nuclear regulatory authorities.

Enterprise Level Security 1 & 2 (Paperback): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Paperback)
Kevin Foltz, William R. Simpson
R2,773 Discovery Miles 27 730 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Modeling, Simulation and Optimization of Complex Processes  HPSC 2015 - Proceedings of the Sixth International Conference on... Modeling, Simulation and Optimization of Complex Processes HPSC 2015 - Proceedings of the Sixth International Conference on High Performance Scientific Computing, March 16-20, 2015, Hanoi, Vietnam (Hardcover, 1st ed. 2017)
Hans Georg Bock, Hoang Xuan Phu, Rolf Rannacher, Johannes P. Schloeder
R4,477 R3,406 Discovery Miles 34 060 Save R1,071 (24%) Ships in 10 - 15 working days

This proceedings volume highlights a selection of papers presented at the Sixth International Conference on High Performance Scientific Computing, which took place in Hanoi, Vietnam on March 16-20, 2015. The conference was jointly organized by the Heidelberg Institute of Theoretical Studies (HITS), the Institute of Mathematics of the Vietnam Academy of Science and Technology (VAST), the Interdisciplinary Center for Scientific Computing (IWR) at Heidelberg University, and the Vietnam Institute for Advanced Study in Mathematics, Ministry of Education The contributions cover a broad, interdisciplinary spectrum of scientific computing and showcase recent advances in theory, methods, and practical applications. Subjects covered numerical simulation, methods for optimization and control, parallel computing, and software development, as well as the applications of scientific computing in physics, mechanics, biomechanics and robotics, material science, hydrology, biotechnology, medicine, transport, scheduling, and industry.

Self-Aware Computing Systems (Hardcover, 1st ed. 2017): Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu Self-Aware Computing Systems (Hardcover, 1st ed. 2017)
Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu
R4,900 Discovery Miles 49 000 Ships in 18 - 22 working days

This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.

Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015): Misty Blowers Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015)
Misty Blowers
R2,738 R2,212 Discovery Miles 22 120 Save R526 (19%) Ships in 10 - 15 working days

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Amazon Comprehend Developer Guide (Hardcover): Documentation Team Amazon Comprehend Developer Guide (Hardcover)
Documentation Team
R892 Discovery Miles 8 920 Ships in 18 - 22 working days
Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities (Hardcover): Maximiliano E. Korstanje Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities (Hardcover)
Maximiliano E. Korstanje
R4,768 Discovery Miles 47 680 Ships in 18 - 22 working days

Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
UNIX Internetworking (Hardcover, 2nd Revised edition): Uday O Pabrai UNIX Internetworking (Hardcover, 2nd Revised edition)
Uday O Pabrai
R3,553 Discovery Miles 35 530 Ships in 18 - 22 working days

"Focuses broadly on those aspects of the UNIX environment that are needed to provide a more global understanding, especially in its dealing with distributed and networked systems, in a very practical and hands-on manner." -- IEEE Network Magazine

High Performance Cloud Auditing and Applications (Hardcover, 2014 ed.): Keesook J Han, Baek-Young Choi, Sejun Song High Performance Cloud Auditing and Applications (Hardcover, 2014 ed.)
Keesook J Han, Baek-Young Choi, Sejun Song
R4,833 Discovery Miles 48 330 Ships in 10 - 15 working days

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments. In summer 2011, the United States Air Force Research Laboratory (AFRL) CyberBAT Cloud Security and Auditing Team initiated the exploration of the cloud security challenges and future cloud auditing research directions that are covered in this book. This work was supported by the United States government funds from the Air Force Office of Scientific Research (AFOSR), the AFOSR Summer Faculty Fellowship Program (SFFP), the Air Force Research Laboratory (AFRL) Visiting Faculty Research Program (VFRP), the National Science Foundation (NSF) and the National Institute of Health (NIH). All chapters were partially supported by the AFOSR Information Operations and Security Program extramural and intramural funds (AFOSR/RSL Program Manager: Dr. Robert Herklotz). Key Features: * Contains surveys of cyber threats and security issues in cloud computing and presents secure cloud architectures * Presents in-depth cloud auditing techniques, federated cloud security architectures, cloud access control models, and access assured information sharing technologies * Outlines a wide range of challenges and provides solutions to manage and control very large and complex data sets

Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover): Philip Alexander Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover)
Philip Alexander
R2,048 Discovery Miles 20 480 Ships in 10 - 15 working days

Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The book goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices. In short, Alexander gives the reader a 360-degree look at data security: What to be worried about; what to look for; the tradeoffs among cost, efficiency, and speed; what different technologies can and can't do; and how to make sure technical professionals are keeping their eyes on the right ball. Best of all, it conveys informationin an understandable way, meaning managers won't need to rely solely on the IT people in their own company--who may speak an entirely different language and have entirely different concerns. Hackers and data thieves are getting smarter and bolder every day. Information Security is your first line of defense.

How to Attack and Defend Your Website (Paperback): Henry Dalziel How to Attack and Defend Your Website (Paperback)
Henry Dalziel; Edited by Alejandro Caceres
R826 Discovery Miles 8 260 Ships in 10 - 15 working days

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

HCISPP Study Guide (Paperback): Timothy Virtue, Justin Rainey HCISPP Study Guide (Paperback)
Timothy Virtue, Justin Rainey
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC(2). The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted to the special demands of health care information security. Tim Virtue and Justin Rainey have created the HCISPP Study Guide to walk you through all the material covered in the exam's Common Body of Knowledge. The six domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the six domains has its own chapter that includes material to aid the test-taker in passing the exam, as well as a chapter devoted entirely to test-taking skills, sample exam questions, and everything you need to schedule a test and get certified. Put yourself on the forefront of health care information privacy and security with the HCISPP Study Guide and this valuable certification.

Defense Mechanisms, Volume 136 - Theoretical, Research and Clinical Perspectives (Hardcover, New): Uwe Hentschel, Gudmund... Defense Mechanisms, Volume 136 - Theoretical, Research and Clinical Perspectives (Hardcover, New)
Uwe Hentschel, Gudmund SMith, Juris G. Draguns, Wolfram Ehlers
R3,176 Discovery Miles 31 760 Ships in 10 - 15 working days

The book is focused on defense mechanisms as theoretical constructs as well as the possibilities of their empirical registration by different methods, and the application of these constructs in different fields of psychology with special regard to concurrent and predictive validity. It is argued that defense mechanisms are in many ways to be seen as integrative constructs, not necessarily restricted to psychoanalytic theory and that the potential fields of their application have a wide ranging scope, comprising many fields of psychology. Consequently empirical studies are presented from the fields of clinical and personality psychology, psychotherapy research and psychosomatic phenomena and diseases. Methodological questions have a heavy weight in most of these studies.
* Provides coverage of relevant literature
* Covers different fields of application
* Attempts an integration of the contstruct of defense mechanisms into mainstream psychology
* Provides explanations of the theoretical basis of the construct of defense mechanisms

Modeling and Simulation in HPC and Cloud Systems (Hardcover, 1st ed. 2018): Joanna Kolodziej, Florin Pop, Ciprian Dobre Modeling and Simulation in HPC and Cloud Systems (Hardcover, 1st ed. 2018)
Joanna Kolodziej, Florin Pop, Ciprian Dobre
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

This book consists of eight chapters, five of which provide a summary of the tutorials and workshops organised as part of the cHiPSet Summer School: High-Performance Modelling and Simulation for Big Data Applications Cost Action on "New Trends in Modelling and Simulation in HPC Systems," which was held in Bucharest (Romania) on September 21-23, 2016. As such it offers a solid foundation for the development of new-generation data-intensive intelligent systems. Modelling and simulation (MS) in the big data era is widely considered the essential tool in science and engineering to substantiate the prediction and analysis of complex systems and natural phenomena. MS offers suitable abstractions to manage the complexity of analysing big data in various scientific and engineering domains. Unfortunately, big data problems are not always easily amenable to efficient MS over HPC (high performance computing). Further, MS communities may lack the detailed expertise required to exploit the full potential of HPC solutions, and HPC architects may not be fully aware of specific MS requirements. The main goal of the Summer School was to improve the participants' practical skills and knowledge of the novel HPC-driven models and technologies for big data applications. The trainers, who are also the authors of this book, explained how to design, construct, and utilise the complex MS tools that capture many of the HPC modelling needs, from scalability to fault tolerance and beyond. In the final three chapters, the book presents the first outcomes of the school: new ideas and novel results of the research on security aspects in clouds, first prototypes of the complex virtual models of data in big data streams and a data-intensive computing framework for opportunistic networks. It is a valuable reference resource for those wanting to start working in HPC and big data systems, as well as for advanced researchers and practitioners.

Web Mobile-based Applications for Healthcare Management (Hardcover, New): Latif Al-Hakim Web Mobile-based Applications for Healthcare Management (Hardcover, New)
Latif Al-Hakim
R2,530 Discovery Miles 25 300 Ships in 18 - 22 working days

Healthcare organizations are constantly designing effective systems aiming to help achieve customer satisfaction. Web-based and mobile-based technologies are two forms of information technologies that healthcare executives are increasingly looking to merge as an opportunity to develop such systems. ""Web Mobile-Based Applications for Healthcare Management"" addresses the difficult task of managing admissions and waiting lists while ensuring a quick and convincing response to unanticipated changes of the clinical needs. ""Web Mobile-Based Applications for Healthcare Management"" tackles the limitations of traditional systems, and takes into consideration the dynamic nature of clinical needs, scarce resources, alternative strategies, and customer satisfaction in an environment that often imposes unexpected deviation from planned activities.

Handbook of Research on Information Security and Assurance (Hardcover): Jatinder N.D. Gupta (The University of Alabama in... Handbook of Research on Information Security and Assurance (Hardcover)
Jatinder N.D. Gupta (The University of Alabama in Huntsville, USA), Sushil Sharma
R6,709 Discovery Miles 67 090 Ships in 18 - 22 working days

While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks.""The Handbook of Research on Information Security and Assurance"" offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by scholars in information science, this reference provides tools to combat the growing risk associated with technology.

3rd International Winter School and Conference on Network Science - NetSci-X 2017 (Hardcover, 1st ed. 2017): Erez Shmueli,... 3rd International Winter School and Conference on Network Science - NetSci-X 2017 (Hardcover, 1st ed. 2017)
Erez Shmueli, Baruch Barzel, Rami Puzis
R2,945 R1,773 Discovery Miles 17 730 Save R1,172 (40%) Ships in 10 - 15 working days

This book contains original research chapters related to the interdisciplinary field of complex networks spanning biological and environmental networks, social, technological, and economic networks. Many natural phenomena can be modeled as networks where nodes are the primitive compounds and links represent their interactions, similarities, or distances of sorts. Complex networks have an enormous impact on research in various fields like biology, social sciences, engineering, and cyber-security to name a few. The topology of a network often encompasses important information on the functionality and dynamics of the system or the phenomenon it represents. Network science is an emerging interdisciplinary discipline that provides tools and insights to researchers in a variety of domains. NetSci-X is the central winter conference within the field and brings together leading researchers and innovators to connect, meet, and establish interdisciplinary channels for collaboration. It is the largest and best known event in the area of network science. This text demonstrates how ideas formulated by authors with different backgrounds are transformed into models, methods, and algorithms that are used to study complex systems across different domains and will appeal to researchers and students within in the field.

Network Science and Cybersecurity (Hardcover, 2014 ed.): Robinson E. Pino Network Science and Cybersecurity (Hardcover, 2014 ed.)
Robinson E. Pino
R4,203 R1,946 Discovery Miles 19 460 Save R2,257 (54%) Ships in 10 - 15 working days

"Network Science and Cybersecurity" introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These attacks may not yet be known or have well-developed signatures. Methods are also suggested to simplify the construction of metrics in such a manner that they retain their ability to effectively cluster data, while simultaneously easing human interpretation of outliers.

This is a professional book for practitioners or government employees working in cybersecurity, and can also be used as a reference. Advanced-level students in computer science or electrical engineering studying security will also find this book useful .

Cloud Computing for Geospatial Big Data Analytics - Intelligent Edge, Fog and Mist Computing (Hardcover, 1st ed. 2019): Himansu... Cloud Computing for Geospatial Big Data Analytics - Intelligent Edge, Fog and Mist Computing (Hardcover, 1st ed. 2019)
Himansu Das, Rabindra K. Barik, Harishchandra Dubey, Diptendu Sinha Roy
R4,721 Discovery Miles 47 210 Ships in 18 - 22 working days

This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data. It solves a number of problems of cloud computing and big data, such as scheduling, security issues using different techniques, which researchers from industry and academia have been attempting to solve in virtual environments. Some of these problems are of an intractable nature and so efficient technologies like fog, edge and mist computing play an important role in addressing these issues. By exploring emerging advances in cloud computing and big data analytics and their engineering applications, the book enables researchers to understand the mechanisms needed to implement cloud, edge, fog, and mist computing in their own endeavours, and motivates them to examine their own research findings and developments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Access 2007 for Starters
Matthew MacDonald Paperback R499 Discovery Miles 4 990
Perl for Oracle DBAs
Andy Duncan Paperback R1,328 Discovery Miles 13 280
Microsoft Office Access 2007
Virginia Andersen Paperback R1,038 R949 Discovery Miles 9 490
The Definitive Guide to db4o
Jim Paterson, Stefan Edlich Hardcover R1,526 Discovery Miles 15 260
Access in easy steps - Illustrating…
Mike McGrath Paperback R346 Discovery Miles 3 460
Access 2013 - The Missing Manual
Matthew MacDonald Paperback R1,257 R1,086 Discovery Miles 10 860
Introductory Relational Database Design…
J. Eckstein Hardcover R2,349 Discovery Miles 23 490
Software Prototyping in Data and…
G. Guida, G. Lamperti, … Hardcover R2,882 Discovery Miles 28 820
Access Data Analysis Cookbook
Ken Bluttman Paperback R1,113 R942 Discovery Miles 9 420
Pro Access 2010 Development
Mark Collins, Creative Enterprises Paperback R1,098 R951 Discovery Miles 9 510

 

Partners