0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,588)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover): J. M. Pierson Large-Scale Distributed Systems and Energy Efficiency - A Holistic View (Hardcover)
J. M. Pierson
R2,679 Discovery Miles 26 790 Ships in 18 - 22 working days

Addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks With concerns about global energy consumption at an all-time high, improving computer networks energy efficiency is becoming an increasingly important topic. Large-Scale Distributed Systems and Energy Efficiency: A Holistic View addresses innovations in technology relating to the energy efficiency of a wide variety of contemporary computer systems and networks. After an introductory overview of the energy demands of current Information and Communications Technology (ICT), individual chapters offer in-depth analyses of such topics as cloud computing, green networking (both wired and wireless), mobile computing, power modeling, the rise of green data centers and high-performance computing, resource allocation, and energy efficiency in peer-to-peer (P2P) computing networks. Discusses measurement and modeling of the energy consumption method Includes methods for energy consumption reduction in diverse computing environments Features a variety of case studies and examples of energy reduction and assessment Timely and important, Large-Scale Distributed Systems and Energy Efficiency is an invaluable resource for ways of increasing the energy efficiency of computing systems and networks while simultaneously reducing the carbon footprint.

Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Amazon Glacier Developer Guide (Hardcover): Documentation Team Amazon Glacier Developer Guide (Hardcover)
Documentation Team
R1,977 Discovery Miles 19 770 Ships in 18 - 22 working days
The Role of SDN in Broadband Networks (Hardcover, 1st ed. 2017): Hassan Habibi Gharakheili The Role of SDN in Broadband Networks (Hardcover, 1st ed. 2017)
Hassan Habibi Gharakheili
R3,172 Discovery Miles 31 720 Ships in 18 - 22 working days

This thesis focuses on the design and use of software defined networking (SDN) in residential Internet service providers (ISPs), as well as innovative operational models that can be incorporated in broadband ecosystems. Though SDN addresses the challenges for bundled best-effort service provided by broadband operators for users, it does not distinguish between the different types of applications (video streaming, web-browsing, and large file transfers), nor does it cater to the varying needs of different household devices (entertainment tablets, work laptops, or connected appliances). This is a problem for end-users, who want to differentiate between applications and devices; for content providers (CPs), who want to exercise control over streams of high monetary value; and for Internet service providers (ISPs), who have to accommodate growing traffic volumes without additional revenues. This book develops a series of solution techniques that use SDN to find an optimal balance between the competing requirements of end-users, ISPs, and CPs. In addition to the design and discussions of various architectures, it provides technical details on real-world system implementations and prototypes. As such, it offers a valuable resource for researchers, network architects, network strategists, developers, and all other readers seeking to learn more about the practical value of SDN in future ISP networks.

IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover): Lazarus Ndiku Makewa, Baraka Manjale Ngussa IT Issues in Higher Education - Emerging Research and Opportunities (Hardcover)
Lazarus Ndiku Makewa, Baraka Manjale Ngussa
R4,585 Discovery Miles 45 850 Ships in 18 - 22 working days

Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how the IT systems are established and maintained. The design, development, management, utilization, and evaluation of these IT systems will be necessary for the university to operate successfully. IT Issues in Higher Education: Emerging Research and Opportunities is a pivotal reference source that provides vital research on the integration and management of information technology in higher education with a focus on issues of security, data management, student access to information, and staff competency. This publication explores present-day educational environments as well as educators' methods of applying technology to student success and highlights topics that include personal devices and institutional culture. It is ideally designed for academic professionals, lecturers, students, professors, IT experts, instructional designers, curriculum developers, administrators, higher education faculty, researchers, and policymakers.

Security in Fixed and Wireless Networks 2e (Hardcover, 2nd Edition): G. Schaefer Security in Fixed and Wireless Networks 2e (Hardcover, 2nd Edition)
G. Schaefer
R2,995 Discovery Miles 29 950 Ships in 10 - 15 working days

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.

Data Networks - Routing, Security, and Performance Optimization (Paperback): Tony Kenyon Data Networks - Routing, Security, and Performance Optimization (Paperback)
Tony Kenyon
R2,534 Discovery Miles 25 340 Ships in 10 - 15 working days

Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for day-to-day problems facing network designers and IT managers. In this book, you will find optimization advice from an experienced practitioner that you can put to work in your own system.
As security and network performance become more and more critical to a company's success, the system administrator's job becomes even more difficult. Use the principles, tips, and techniques Kenyon offers here to enhance and protect the flow of data within your enterprise.
-Covers Addressing, Routing, Multicasting, and Quality of Service (QoS) design for enterprise network design.
-Extensive coverage on relevant Security Technologies and Virtual Private Network (VPN) implementation
-Provides advanced coverage on Risk Assessment, Availability Analysis, Fault Tolerance, Disaster Recovery, and Network Optimization.

Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021): Hanen Idoudi, Thierry Val Smart Systems for E-Health - WBAN Technologies, Security and Applications (Hardcover, 1st ed. 2021)
Hanen Idoudi, Thierry Val
R4,635 Discovery Miles 46 350 Ships in 10 - 15 working days

The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.

Advances in Delay-tolerant Networks (DTNs) - Architecture and Enhanced Performance (Hardcover): Joel J. P. C. Rodrigues Advances in Delay-tolerant Networks (DTNs) - Architecture and Enhanced Performance (Hardcover)
Joel J. P. C. Rodrigues
R6,147 Discovery Miles 61 470 Ships in 10 - 15 working days

Part one looks at delay-tolerant network architectures and platforms including DTN for satellite communications and deep-space communications, underwater networks, networks in developing countries, vehicular networks and emergency communications. Part two covers delay-tolerant network routing, including issues such as congestion control, naming, addressing and interoperability. Part three explores services and applications in delay-tolerant networks, such as web browsing, social networking and data streaming. Part four discusses enhancing the performance, reliability, privacy and security of delay-tolerant networks. Chapters cover resource sharing, simulation and modeling and testbeds.

Virtual Private Networks - Making the Right Connection (Paperback): Dennis Fowler Virtual Private Networks - Making the Right Connection (Paperback)
Dennis Fowler
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

Network-dependent companies are excited by the benefits promised by the virtual private network, including lower costs, greater flexibility, and improvements in connectivity. But they also have questions: What benefits are real? How can they be measured? What are the expenses and the dangers?

Virtual Private Networks: Making the Right Connection is an intelligent introduction written especially for business and IT professionals who want a realistic assessment of what a VPN can provide for their organizations. Covering advantages and risks, this book expands your understanding of what you can do with a VPN, while detailing all that implementing it will demand of you. With its help, you'll find your way through VPN hype to the answers you need to make sound decisions.
* Thoroughly explains VPN concepts and technologies, and examines the potential of VPNs as intranets, extranets, and remote access solutions.
* Covers essential VPN topics like tunneling, encapsulation, encryption, security, and protocols.
* Provides detailed points of comparison between typical VPN costs and the costs of maintaining traditional WANs.
* Offers frank consideration of the hidden costs and risks sometimes associated with VPNs, helping you decide if a VPN is right for you.
* Lists and assesses the software and hardware products you may need to implement a VPN.
* Discusses both Internet-based VPNs and VPN services offered by providers of "private" ATM and frame relay networks, detailing the pros and cons of each.

Fundamentals of Cellular Network Planning and Optimisation - 2G/2 5G/3G Evolution to 4G (Hardcover): A.R. Mishra Fundamentals of Cellular Network Planning and Optimisation - 2G/2 5G/3G Evolution to 4G (Hardcover)
A.R. Mishra
R2,451 Discovery Miles 24 510 Ships in 18 - 22 working days

"By 2008, some 2 billion people will be using mobile phones and devices, in many cases to access advanced data services. Against this backdrop, the need for efficient and effective network design will be critical to the success of increasingly complex mobile networks."

"Simon Beresford-Wylie (SVP, Nokia Networks)"

With the complexity of the cellular networks increasing day by day, a deeper understanding of the design and performance of end-to-end cellular networks is required. Moreover, all the types of networks from 2G-2.5G-3G seem to co-exist. "Fundamentals of" "Cellular Network Planning and Optimisation" covers end-to-end network planning and optimisation aspects from second generation GSM to third generation WCDMA networks including GPRS and EDGE networks. All the sub-systems of the network i.e. radio network, transmission network and core network have been covered with focus on both practical and theoretical issues. By bringing all these concepts under one cover, this book becomes essential reading for the network design engineers working either with cellular service vendors or operators, experts/scientists working on end-to-end issues and undergraduate/post-graduate students.

Key Highlights: Distinctly divided into four parts: 2G (GSM), 2.5G (GPRS & EDGE), 3G (WCDMA) and introduction to 4G (OFDM, ALL-IP, WLAN Overview) respectivelyEach part focuses on the radio, transmission and core networks.Concentrates on cellular network planning process and explains the underlying principles behind the planning and optimizing of the cellular networks.

The text will serve as a handbook for anyone engaged in the study, design, deployment and business of cellular networks.

Charging Communication Networks - From Theory to Practice (Hardcover): D.J. Songhurst Charging Communication Networks - From Theory to Practice (Hardcover)
D.J. Songhurst
R3,210 Discovery Miles 32 100 Ships in 18 - 22 working days

This book proposes that usage-based charging schemes are essential to generate the incentives necessary for efficient operation of multiservice networks. The rapid development of network technology is enabling sophisticated new services and applications which demand new charging models. The same technology provides the means to operate the right charging schemes.Some of the work done in the European collaborative project CA$hMAN (Charging and Accounting Schemes in Multiservice ATM Networks). This project combined performance and economic models of network resource usage and cutomer utility to construct simple but effective charging schemes which were implemented and trialled in an advanced management platform.

Anonymous Security Systems and Applications - Requirements and Solutions (Hardcover, New): Shinsuke Tamura Anonymous Security Systems and Applications - Requirements and Solutions (Hardcover, New)
Shinsuke Tamura
R4,905 Discovery Miles 49 050 Ships in 18 - 22 working days

As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual s purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed to obscure the identities of users. These technologies may help solve various privacy issues and encourage more people to make full use of information and communication technologies, and may help to establish more secure, convenient, efficient, and environmentally-friendly societies.

Video Conferencing over IP: Configure, Secure, and Troubleshoot (Paperback): Michael Gough Video Conferencing over IP: Configure, Secure, and Troubleshoot (Paperback)
Michael Gough
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.
For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact.
Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs.
* Budget conscious methods for deploying Video over IP in small to medium enterprises
* Coverage of Cisco, Microsoft, Skype, AOL, Google, VidiTel and many other products
* How to identify and resolve nagging quality of service issues such as transmission delays and out of synch video-to-voice feeds

Frontier and Innovation in Future Computing and Communications (Hardcover, 2014): James J (Jong Hyuk) Park, Albert Zomaya, Hwa... Frontier and Innovation in Future Computing and Communications (Hardcover, 2014)
James J (Jong Hyuk) Park, Albert Zomaya, Hwa Young Jeong, Mohammad Obaidat
R7,867 Discovery Miles 78 670 Ships in 18 - 22 working days

IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.

User Interface Design - A Structured Approach (Hardcover, New): Siegfried Treu User Interface Design - A Structured Approach (Hardcover, New)
Siegfried Treu
R2,453 Discovery Miles 24 530 Ships in 18 - 22 working days

Introduction: Historical Perspective. Definitions and Dependencies. Prerequisite Knowledge Areas: User Capabilities and Limitations. Computer Applications and Tasks. Computer Capabilities and Limitations. Interaction Characteristics and Options. Representation Models and Methods. Supportive Tools and Techniques. Design and Development: Design Terms and Decision Constructs. Design Approaches and Methods. Design Objects, Modules, and Models. Special-Purpose Designs: Network-Oriented Design. Adaptive Design. Index.

Business Transformation and Sustainability through Cloud System Implementation (Hardcover): Fawzy Soliman Business Transformation and Sustainability through Cloud System Implementation (Hardcover)
Fawzy Soliman
R5,075 Discovery Miles 50 750 Ships in 18 - 22 working days

Sustaining a competitive edge in today's business world requires innovative approaches to product, service, and management systems design and performance. Advances in computing technologies have presented managers with additional challenges as well as further opportunities to enhance their business models Business Transformation and Sustainability through Cloud System Implementation presents novel computing technologies designed for use in business and corporate environments, enabling managers and associates to make the most of the technologies at their disposal. This premier reference work seeks to alert firm management professionals and researchers to the potential risks and benefits associated with emerging technologies and guide firms on the proper selection, maintenance, and use of Web-based computing systems.

Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017): Mihaly Makai, Janos Vegh Reactor Core Monitoring - Background, Theory and Practical Applications (Hardcover, 1st ed. 2017)
Mihaly Makai, Janos Vegh
R4,641 R3,570 Discovery Miles 35 700 Save R1,071 (23%) Ships in 10 - 15 working days

This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants. It also offers a brief overview of the corresponding techniques at research and materials testing reactors. The book combines detailed descriptions of the theoretical background and fundamental underlying principles as well as the practical applications of core surveillance. It not only provides numerous industrial examples to illustrate how complex computerized systems are able to support the safe operation of nuclear reactors, but also outlines some new application areas that were made possible only by state-of-the-art computing resources. Thanks to its practical approach, it serves as a valuable and practical reference book for readers interested in the surveillance of nuclear reactors, ranging from undergraduate and postgraduate students to researchers and experts working at research reactors and nuclear power plants, as well as at nuclear regulatory authorities.

Enterprise Level Security 1 & 2 (Paperback): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Paperback)
Kevin Foltz, William R. Simpson
R2,773 Discovery Miles 27 730 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Modeling, Simulation and Optimization of Complex Processes  HPSC 2015 - Proceedings of the Sixth International Conference on... Modeling, Simulation and Optimization of Complex Processes HPSC 2015 - Proceedings of the Sixth International Conference on High Performance Scientific Computing, March 16-20, 2015, Hanoi, Vietnam (Hardcover, 1st ed. 2017)
Hans Georg Bock, Hoang Xuan Phu, Rolf Rannacher, Johannes P. Schloeder
R4,477 R3,406 Discovery Miles 34 060 Save R1,071 (24%) Ships in 10 - 15 working days

This proceedings volume highlights a selection of papers presented at the Sixth International Conference on High Performance Scientific Computing, which took place in Hanoi, Vietnam on March 16-20, 2015. The conference was jointly organized by the Heidelberg Institute of Theoretical Studies (HITS), the Institute of Mathematics of the Vietnam Academy of Science and Technology (VAST), the Interdisciplinary Center for Scientific Computing (IWR) at Heidelberg University, and the Vietnam Institute for Advanced Study in Mathematics, Ministry of Education The contributions cover a broad, interdisciplinary spectrum of scientific computing and showcase recent advances in theory, methods, and practical applications. Subjects covered numerical simulation, methods for optimization and control, parallel computing, and software development, as well as the applications of scientific computing in physics, mechanics, biomechanics and robotics, material science, hydrology, biotechnology, medicine, transport, scheduling, and industry.

Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover)
Harris Schwartz
R786 Discovery Miles 7 860 Ships in 18 - 22 working days
Self-Aware Computing Systems (Hardcover, 1st ed. 2017): Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu Self-Aware Computing Systems (Hardcover, 1st ed. 2017)
Samuel Kounev, Jeffrey O. Kephart, Aleksandar Milenkoski, Xiaoyun Zhu
R4,900 Discovery Miles 49 000 Ships in 18 - 22 working days

This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply.

Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015): Misty Blowers Evolution of Cyber Technologies and Operations to 2035 (Hardcover, 1st ed. 2015)
Misty Blowers
R2,738 R2,212 Discovery Miles 22 120 Save R526 (19%) Ships in 10 - 15 working days

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover): Philip Alexander Information Security - A Manager's Guide to Thwarting Data Thieves and Hackers (Hardcover)
Philip Alexander
R2,217 R2,048 Discovery Miles 20 480 Save R169 (8%) Ships in 10 - 15 working days

Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by a practicing information security officer, Philip Alexander, the book contains the latest information and arms readers with the knowledge they need to make better business decisions. Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The book goes beyond the technical and covers highly important topics related to data security like outsourcing, contractual considerations with vendors, data privacy laws, and hiring practices. In short, Alexander gives the reader a 360-degree look at data security: What to be worried about; what to look for; the tradeoffs among cost, efficiency, and speed; what different technologies can and can't do; and how to make sure technical professionals are keeping their eyes on the right ball. Best of all, it conveys informationin an understandable way, meaning managers won't need to rely solely on the IT people in their own company--who may speak an entirely different language and have entirely different concerns. Hackers and data thieves are getting smarter and bolder every day. Information Security is your first line of defense.

Amazon Comprehend Developer Guide (Hardcover): Documentation Team Amazon Comprehend Developer Guide (Hardcover)
Documentation Team
R892 Discovery Miles 8 920 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Blockchain Technology in Corporate…
K Sood Hardcover R4,308 Discovery Miles 43 080
CompTIA Network+ Guide to Networks
Jill West Paperback R1,362 R1,269 Discovery Miles 12 690
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170

 

Partners