0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (827)
  • R500+ (14,092)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Analyzing Security, Trust, and Crime in the Digital World (Hardcover): Hamid R. Nemati Analyzing Security, Trust, and Crime in the Digital World (Hardcover)
Hamid R. Nemati
R5,244 Discovery Miles 52 440 Ships in 10 - 15 working days

In the digital era, information is the most valuable resource, and protecting one s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein."

Smart Service Systems, Operations Management, and Analytics - Proceedings of the 2019 INFORMS International Conference on... Smart Service Systems, Operations Management, and Analytics - Proceedings of the 2019 INFORMS International Conference on Service Science (Hardcover, 1st ed. 2020)
Hui Yang, Robin Qiu, Weiwei Chen
R4,412 Discovery Miles 44 120 Ships in 10 - 15 working days

This volume offers state-of-the-art research in service science and its related research, education and practice areas. It showcases recent developments in smart service systems, operations management and analytics and their impact in complex service systems. The papers included in this volume highlight emerging technology and applications in fields including healthcare, energy, finance, information technology, transportation, sports, logistics, and public services. Regardless of size and service, a service organization is a service system. Because of the socio-technical nature of a service system, a systems approach must be adopted to design, develop, and deliver services, aimed at meeting end users' both utilitarian and socio-psychological needs. Effective understanding of service and service systems often requires combining multiple methods to consider how interactions of people, technology, organizations, and information create value under various conditions. The papers in this volume present methods to approach such technical challenges in service science and are based on top papers from the 2019 INFORMS International Conference on Service Science.

Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019): Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu,... Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019)
Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, …
R3,615 Discovery Miles 36 150 Ships in 10 - 15 working days

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Business Data Communications and Networking - A Research Perspective (Hardcover, New): Business Data Communications and Networking - A Research Perspective (Hardcover, New)
R2,854 Discovery Miles 28 540 Ships in 10 - 15 working days

The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. ""Business Data Communications and Networking: A Research Perspective"" addresses the key issues for businesses utilizing data communications and the increasing importance of networking technologies in business. ""Business Data Communications and Networking: A Research Perspective"" covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and centers on the issues of network-based applications, mobility, wireless networks, and network security.

A Rhetoric of Electronic Communities (Hardcover, New): Tharon W. Howard A Rhetoric of Electronic Communities (Hardcover, New)
Tharon W. Howard
R2,770 Discovery Miles 27 700 Ships in 10 - 15 working days

This book is a study of the power to monitor what is said, authorize who may speak, and even to determine what is and is not knowable within the context of electronic discourse communities. It tests the claim that the Internet and other wide-area networking systems promote participatory democracies and may serve as agencies for communal change by enabling the formation of resisting subjectivities.

Creating a Local Area Network in the School Library Media Center (Hardcover, New): Becky Mather Creating a Local Area Network in the School Library Media Center (Hardcover, New)
Becky Mather
R2,127 Discovery Miles 21 270 Ships in 10 - 15 working days

Let an award-winning school library media specialist who has implemented a local area network (LAN) in her media center help you plan this important addition to your media center while avoiding the pitfalls. This hands-on practical guide contains all the information the network novice needs to plan, fund, create, and maintain a LAN in the media center. Based on the experience of the school library media specialist who received the 1994 Follett/AASL "Microcomputer in the Media Center Award" for creating a local area network in the high school media center, this guide describes the procedures for planning, designing, funding, installing, organizing, training, evaluating, and maintaining a LAN in a library media center setting. Step-by-step nontechnical instructions and advice for creating an information network are presented in an understandable format. How to expand into a school-district wide area network (WAN) and gain access to the Internet are also discussed. This comprehensive work takes the network novice from dream to implementation, maintenance, and evaluation of a local area network. It covers funding sources, tips for writing technology grants, requests for proposals from vendors, staff inservice and student training, evaluation and assessment, student internships, technology teams, troubleshooting equipment, and network administration. Useful forms, simple network schematic diagrams, a model school-board approved electronic resources policy, a glossary of technical terms, and sample assessment tools are included. No other book walks the library media specialist through every step in creating a LAN. Media professionals who want to provide networked electronic information to thestaff and students but are not sure of how to proceed will benefit from this clear, nontechnical guide to the process.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Paperback)
James Aweya
R4,029 Discovery Miles 40 290 Ships in 12 - 19 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover): James Aweya Designing Switch/Routers - Fundamental Concepts, Design Methods, Architectures and Applications (Hardcover)
James Aweya
R9,895 Discovery Miles 98 950 Ships in 12 - 19 working days

This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.

Proceedings of International Symposium on Sensor Networks, Systems and Security - Advances in Computing and Networking with... Proceedings of International Symposium on Sensor Networks, Systems and Security - Advances in Computing and Networking with Applications (Hardcover, 1st ed. 2018)
Nageswara S.V. Rao, Richard R. Brooks, Chase Q. Wu
R5,126 Discovery Miles 51 260 Ships in 10 - 15 working days

This book presents current trends that are dominating technology and society, including privacy, high performance computing in the cloud, networking and IoT, and bioinformatics. By providing chapters detailing accessible descriptions of the research frontiers in each of these domains, the reader is provided with a unique understanding of what is currently feasible. Readers are also given a vision of what these technologies can be expected to produce in the near future. The topics are covered comprehensively by experts in respective areas. Each section includes an overview that puts the research topics in perspective and integrates the sections into an overview of how technology is evolving. The book represents the proceedings of the International Symposium on Sensor Networks, Systems and Security, August 31 - September 2, 2017, Lakeland Florida.

The Network Organization - A Governance Perspective on Structure, Dynamics and Performance (Hardcover, 1st ed. 2017): Anna... The Network Organization - A Governance Perspective on Structure, Dynamics and Performance (Hardcover, 1st ed. 2017)
Anna Moretti
R2,055 Discovery Miles 20 550 Ships in 12 - 19 working days

This book explores the basic traits of inter-organizational networks, examining the interplay between structure, dynamics, and performance from a governance perspective. The book assumes a novel theoretical angle based on the interpretation of networks as multiple systems, and advances the theory in the realm of network effectiveness and failure. Composed of two parts, theoretical and empirical, The Network Organization clarifies the literature on networks, offering a systematic review, and provides a new perspective on their integration with other streams of research focusing on under-studied issues such as agency, micro-dynamics, and network effectiveness. The second part proposes the analysis of the tourism destination of Venice, with a specific focus on the network between the Venice Film Festival, the hospitality system, and the local institutions. By exploring the pervasion of networks in modern social and economic life, this book will be valuable to students, researchers, practitioners and policy-makers.

Evolutionary Computing and Mobile Sustainable Networks - Proceedings of ICECMSN 2020 (Hardcover, 1st ed. 2021): V. Suma,... Evolutionary Computing and Mobile Sustainable Networks - Proceedings of ICECMSN 2020 (Hardcover, 1st ed. 2021)
V. Suma, Noureddine Bouhmala, Haoxiang Wang
R5,823 Discovery Miles 58 230 Ships in 10 - 15 working days

This book features selected research papers presented at the International Conference on Evolutionary Computing and Mobile Sustainable Networks (ICECMSN 2020), held at the Sir M. Visvesvaraya Institute of Technology on 20-21 February 2020. Discussing advances in evolutionary computing technologies, including swarm intelligence algorithms and other evolutionary algorithm paradigms which are emerging as widely accepted descriptors for mobile sustainable networks virtualization, optimization and automation, this book is a valuable resource for researchers in the field of evolutionary computing and mobile sustainable networks.

Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021): Riccardo M.G. Ferrari, Andre M. H. Teixeira Safety, Security and Privacy for Cyber-Physical Systems (Hardcover, 1st ed. 2021)
Riccardo M.G. Ferrari, Andre M. H. Teixeira
R4,655 Discovery Miles 46 550 Ships in 10 - 15 working days

This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control and estimation, detection of attacks and security metrics, watermarking and encrypted control, privacy and a novel defense approach based on deception. The book concludes by discussing risk management and cyber-insurance challenges in CPSs, and by presenting the future outlook for this area of research as a whole. Its wide-ranging collection of varied works in the emerging fields of security and privacy in networked control systems makes this book a benefit to both academic researchers and advanced practitioners interested in implementing diverse applications in the fields of IoT, cooperative autonomous vehicles and the smart cities of the future.

Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Biometrics - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,234 Discovery Miles 102 340 Ships in 10 - 15 working days
Principles of Security and Trust (Hardcover): David Sands, Flemming Nielson Principles of Security and Trust (Hardcover)
David Sands, Flemming Nielson
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days
Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019): K. Erciyes Distributed Real-Time Systems - Theory and Practice (Hardcover, 1st ed. 2019)
K. Erciyes
R2,308 Discovery Miles 23 080 Ships in 10 - 15 working days

This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.

Emerging Technologies and Applications for Cloud-Based Gaming (Hardcover): P. Venkata Krishna Emerging Technologies and Applications for Cloud-Based Gaming (Hardcover)
P. Venkata Krishna
R5,298 Discovery Miles 52 980 Ships in 10 - 15 working days

Online gaming is widely popular and gaining more user attention every day. Computer game industries have made considerable growth in terms of design and development, but the scarcity of hardware resources at player or client side is a major pitfall for the latest high-end multimedia games. Cloud gaming is one proposed solution, allowing the end-user to play games using a variety of platforms with less demanding hardware requirements. Emerging Technologies and Applications for Cloud-Based Gaming explores the opportunities for the gaming industry through the integration of cloud computing. Focusing on design methodologies, fundamental architectures, and the end-user experience, this publication is an essential reference source for IT specialists, game developers, researchers, and graduate-level students.

IT Convergence and Security - Proceedings of ICITCS 2020 (Hardcover, 1st ed. 2021): Hyuncheol Kim, Kuinam J. Kim IT Convergence and Security - Proceedings of ICITCS 2020 (Hardcover, 1st ed. 2021)
Hyuncheol Kim, Kuinam J. Kim
R1,527 Discovery Miles 15 270 Ships in 10 - 15 working days

This volume comprises the proceedings of ICITCS 2020. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security is core to most current research, industrial and commercial activities. Topics covered in this volume include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, healthcare and wellness, web technology and applications, internet of things, and security & privacy. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book will be of use to researchers in academia, industry and other research institutes focusing on IT convergence and security.

Quantitative Data Analysis - A Companion for Accounting and Information Systems Research (Hardcover, 1st ed. 2017): Willem... Quantitative Data Analysis - A Companion for Accounting and Information Systems Research (Hardcover, 1st ed. 2017)
Willem Mertens, Amedeo Pugliese, Jan Recker
R2,957 Discovery Miles 29 570 Ships in 12 - 19 working days

This book offers postgraduate and early career researchers in accounting and information systems a guide to choosing, executing and reporting appropriate data analysis methods to answer their research questions. It provides readers with a basic understanding of the steps that each method involves, and of the facets of the analysis that require special attention. Rather than presenting an exhaustive overview of the methods or explaining them in detail, the book serves as a starting point for developing data analysis skills: it provides hands-on guidelines for conducting the most common analyses and reporting results, and includes pointers to more extensive resources. Comprehensive yet succinct, the book is brief and written in a language that everyone can understand - from students to those employed by organizations wanting to study the context in which they work. It also serves as a refresher for researchers who have learned data analysis techniques previously but who need a reminder for the specific study they are involved in.

Database Law - Perspectives from India (Hardcover, 1st ed. 2016): Anirban Mazumder Database Law - Perspectives from India (Hardcover, 1st ed. 2016)
Anirban Mazumder
R3,763 R3,481 Discovery Miles 34 810 Save R282 (7%) Ships in 12 - 19 working days

This book focuses on database law (a branch of intellectual property law) and further explores the legal protection currently available for data and data-related products in India. It offers a comparative study of the position of copyright law in protecting databases in the US and EU, while also presenting responses from the Indian database industry and its aspirations regarding the role of copyright law in database protection. India is undoubtedly leading the way as a knowledge economy. Its strengths are its information technology capability and its knowledge society, as well as its booming database industry - aspects that also necessitate the study of the role of law, as well as the protection of data and databases, in India. This book examines the growing importance of copyright law for protecting databases as well as for ensuring access in information societies. The book concludes with a discussion of key principles to be kept in mind in the context of drafting legal regimes for databases in India that will both benefit the database industry and ensure accessibility.

Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover): Sudeep Tanwar Blockchain for 5G Healthcare Applications - Security and privacy solutions (Hardcover)
Sudeep Tanwar
R3,979 R3,581 Discovery Miles 35 810 Save R398 (10%) Ships in 10 - 15 working days

A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to achieve secure systems for Healthcare 4.0 using Blockchain, with emphasis on the key challenges of privacy and security. The book is organized into four sections. The first section is focused on 5G healthcare privacy and security concerns. The second section discusses healthcare architecture and emerging technologies. The third section covers the role of artificial intelligence for data security and privacy in 5G healthcare services. Finally, the last section systematically illustrates the adoption of blockchain in various applications of 5G healthcare. The book is essential reading for all involved in setting up, running, and maintaining healthcare information systems. Engineers, scientists, technologists, developers, designers, and researchers in healthcare technologies, health informatics, security, and information technology will find the content particularly useful.

Cloud Computing - Architecture and Applications (Hardcover): Jaydip Sen Cloud Computing - Architecture and Applications (Hardcover)
Jaydip Sen
R3,340 Discovery Miles 33 400 Ships in 10 - 15 working days
Crime Prevention Technologies and Applications for Advancing Criminal Investigation (Hardcover, New): Chang-Tsun Li, Anthony... Crime Prevention Technologies and Applications for Advancing Criminal Investigation (Hardcover, New)
Chang-Tsun Li, Anthony T.S. Ho
R5,356 Discovery Miles 53 560 Ships in 10 - 15 working days

The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer questions of interest to the legal system. This book fosters a forum for advancing research and development of the theory and practice of digital crime prevention and forensics.

Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021): Jennifer S.... Innovative Data Communication Technologies and Application - Proceedings of ICIDCA 2020 (Hardcover, 1st ed. 2021)
Jennifer S. Raj, Abdullah M. Iliyasu, Robert Bestak, Zubair A. Baig
R8,777 Discovery Miles 87 770 Ships in 12 - 19 working days

This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.

Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover): Francesco Flammini Critical Infrastructure Security - Assessment, Prevention, Detection, Response (Hardcover)
Francesco Flammini
R5,483 Discovery Miles 54 830 Ships in 12 - 19 working days

This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software

Network and Communication Technology Innovations for Web and IT Advancement (Hardcover): Ghazi I. Alkhatib Network and Communication Technology Innovations for Web and IT Advancement (Hardcover)
Ghazi I. Alkhatib
R5,229 Discovery Miles 52 290 Ships in 10 - 15 working days

With the steady stream of new web based information technologies being introduced to organizations, the need for network and communication technologies to provide an easy integration of knowledge and information sharing is essential. Network and Communication Technology Innovations for Web and IT Advancement presents studies on trends, developments, and methods on information technology advancements through network and communication technology. This collection brings together integrated approaches for communication technology and usage for web and IT advancements.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,420 R1,316 Discovery Miles 13 160
Managing Business Projects - The…
Frank Einhorn Paperback R515 Discovery Miles 5 150
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,557 Discovery Miles 15 570
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,461 R1,230 Discovery Miles 12 300
Digital Signal Processing and…
Dag Stranneby Paperback R1,454 Discovery Miles 14 540
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,916 Discovery Miles 19 160
CISA - Certified Information Systems…
Cannon Paperback R1,739 R1,389 Discovery Miles 13 890
Two-Factor Authentication
Mark Stanislav Paperback R534 Discovery Miles 5 340
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,473 Discovery Miles 24 730
Guide to Networking Essentials
Greg Tomsho Paperback R1,452 R1,344 Discovery Miles 13 440

 

Partners