0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (320)
  • R250 - R500 (913)
  • R500+ (16,230)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

CEH v11 Certified Ethical Hacker Study Guide (Paperback): R Messier CEH v11 Certified Ethical Hacker Study Guide (Paperback)
R Messier
R917 Discovery Miles 9 170 Ships in 12 - 17 working days

As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.

Information Security and Optimization (Hardcover): Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta Information Security and Optimization (Hardcover)
Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
R3,246 Discovery Miles 32 460 Ships in 12 - 17 working days

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools-definitions, usage, and analysis-that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Beyond EHR - Using Technology to Meet Growing Demands and Deliver Better Patient Care (Hardcover): Jeffery Daigrepont, EFPM,... Beyond EHR - Using Technology to Meet Growing Demands and Deliver Better Patient Care (Hardcover)
Jeffery Daigrepont, EFPM, CAPPM
R4,143 Discovery Miles 41 430 Ships in 12 - 17 working days

Today, it is not uncommon for practices and hospitals to be on their second or third EHR and/or contemplating a transition from the traditional on-premise model to a cloud-based system. As a follow-up to Complete Guide and Toolkit to Successful EHR Adoption ( (c)2011 HIMSS), this book builds on the best practices of the first edition, fast-forwarding to the latest innovations that are currently leveraged and adopted by providers and hospitals. We examine the role that artificial intelligence (AI) is now playing in and around EHR technology. We also address the advances in analytics and deep learning (also known as deep structured or hierarchical learning) and explain this topic in practical ways for even the most novice reader to comprehend and apply. The challenges of EHR to EHR migrations and data conversions will also be covered, including the use of the unethical practice of data blocking used as a tactic by some vendors to hold data hostage. Further, we explore innovations related to interoperability, cloud computing, cyber security, and electronic patient/consumer engagement. Finally, this book will deal with what to do with aging technology and databases, which is an issue rarely considered in any of the early publications on healthcare technology. What is the proper way to retire a legacy system, and what are the legal obligations of data archiving? Though a lot has changed since the 2011 edition, many of the fundamentals remain the same and will serve as a foundation for the next generation of EHR adopters and/or those moving on to their second, third, fourth, and beyond EHRs.

Trust and Records in an Open Digital Environment (Hardcover): Hrvoje Stancic Trust and Records in an Open Digital Environment (Hardcover)
Hrvoje Stancic
R4,152 Discovery Miles 41 520 Ships in 12 - 17 working days

Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy. Showing that records need to ensure public trust, especially in the era of alternative truths, this volume argues that reliable resources, which are openly accessible from governmental institutions, e-services, archival institutions, digital repositories, and cloud-based digital archives, are the key to an open digital environment. The book also demonstrates that current established practices need to be reviewed and amended to include the networked nature of the cloud-based records, to investigate the role of new players, like cloud service providers (CSP), and assess the potential for implementing new, disruptive technologies like blockchain. Stancic and the contributors address these challenges by taking three themes - state, citizens, and documentary form - and discussing their interaction in the context of open government, open access, recordkeeping, and digital preservation. Exploring what is needed to enable the establishment of an open digital environment, Trust and Records in an Open Digital Environment should be essential reading for data, information, document, and records management professionals. It will also be a key text for archivists, librarians, professors, and students working in the information sciences and other related fields.

Security and Organization within IoT and Smart Cities (Hardcover): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Hardcover)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R2,120 Discovery Miles 21 200 Ships in 12 - 17 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Paperback): Stefan Strauss Privacy and Identity in a Networked Society - Refining Privacy Impact Assessment (Paperback)
Stefan Strauss
R1,300 Discovery Miles 13 000 Ships in 12 - 17 working days

This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age. Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards. This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.

Forensic Document Examination in the 21st Century (Hardcover): Miriam Angel, Jan Seaman Kelly Forensic Document Examination in the 21st Century (Hardcover)
Miriam Angel, Jan Seaman Kelly
R3,269 Discovery Miles 32 690 Ships in 12 - 17 working days

Forensic Document Examination in the 21st Century covers the latest technology and techniques providing a complete resource on contemporary issues and methods in forensic document examination. Forensic document examiners provide their findings as expert testimony in court. Due to rapid changes in technology, including digital documents, printing and photocopying capabilities, and more, there is a great need for this up-to-date reference. The examination of documents can include comparison of handwriting or hand-printing; detection of alterations or photocopier and computer manipulation; restoration or decipherment of erased and obliterated writing; visualization of latent impressions; the identification of printing processes; and differentiation of inks. Computer-generated documents are prevalent, and electronically-captured signatures are becoming more widespread, meaning the knowledge of advances in technology and adoption of new validated techniques and methods of document examination are crucial to the reliability of forensic opinions. Forensic Document Examination in the 21st Century includes the latest research on the subject and with contributions from leading experts on their various areas of expertise. The book will be a welcome addition to the literature and support the foundational basis for methods and procedures for use it expert testimony in court, serving as a resource for forensic document examiners, trainees, and those in the criminal and legal communities who use the services of expert document examiners and witnesses

Toward Solving Complex Human Problems - Techniques for Increasing Our Understanding of What Matters in Doing So (Hardcover):... Toward Solving Complex Human Problems - Techniques for Increasing Our Understanding of What Matters in Doing So (Hardcover)
Brian E. White
R1,706 Discovery Miles 17 060 Ships in 12 - 17 working days

This book serves three basic purposes: (1) a tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, (2) a recommendation of a proposed methodology showing how the evolving practice of CSE can lead to a more unified theory, and (3) a complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners-e.g., developers of new or improved systems (particularly systems engineers), program and project managers, associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel, contract specialists, owners of large and small businesses, professional society members, and CS researchers-may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors and CSE principles and will therefore be able to focus on techniques that will better serve them in their everyday work environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control since people cannot be completely controlled. Therefore, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this book, it seems to make sense to provide a tutorial introduction that readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artifacts and methodology, followed by a chapter emphasizing worthwhile areas of application.

Interoperability in IoT for Smart Systems (Hardcover): Monideepa Roy, Pushpendu Kar, Sujoy Datta Interoperability in IoT for Smart Systems (Hardcover)
Monideepa Roy, Pushpendu Kar, Sujoy Datta
R3,251 Discovery Miles 32 510 Ships in 12 - 17 working days

Exclusively covers interoperability of IoT systems in parallel with their use towards the development of smart systems Discusses the requirements of interoperability in smart IoT systems and their solutions Reviews IoT applications in different smart and intelligent systems Explores dealing with interoperability of heterogeneous participating devices Provides different case studies and open problems related to interoperability in IoT system

Integrating Information in Built Environments - From Concept to Practice (Paperback): Adriana X. Sanchez, Keith Hampson,... Integrating Information in Built Environments - From Concept to Practice (Paperback)
Adriana X. Sanchez, Keith Hampson, Geoffrey London
R1,483 Discovery Miles 14 830 Ships in 12 - 17 working days

In an increasingly globalised built environment industry, achieving higher levels of integration across organisational and software boundaries can lead to improved economic, social and environmental outcomes. This book is the direct result of a collaborative global network of industry and academic researchers spread across nine countries as part of CIB's (International Council for Research and Innovation in Building and Construction) Task Group 90 (TG90) Information Integration in Construction (IICON). The book provides a broad view of some of the opportunities and challenges brought by integrating information across organisational and system boundaries in the built environment industry. Chapters cover a large range of topics and are separated into three sections: resources, processes and added value. They provide a much-needed international perspective on a current global evolution in the industry and present leading original research and valuable lessons for researchers, industry practitioners, government clients and policy makers across the industry. Key features include: a broad range of topics that are not covered elsewhere in the literature; contributions from a diverse group of industry research leaders from across the globe; exemplar case studies providing real-world examples of where information integration has been a key factor for success or lack thereof has been at the root cause of failure; an analysis of future priority areas for research and development investment as well as their strategic implications for public and private decision-makers; the book will deliver innovation in best practice methodology for information sharing across disciplines and between the design, construction and asset management sectors.

Portfolio Management - Delivering on Strategy (Paperback, 2nd edition): Carl Marnewick, John Wyzalek Portfolio Management - Delivering on Strategy (Paperback, 2nd edition)
Carl Marnewick, John Wyzalek
R1,415 Discovery Miles 14 150 Ships in 9 - 15 working days

Portfolio management is becoming the 'must have' for organizations to prosper and survive in this decade and beyond. No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs, projects, and operational work that add business value can and should be pursued. Executives are focusing on strategic ability and managing complexity, which only can be done through a disciplined portfolio process in ensuring the best mix of programs, projects, and operational work is under way. In turn, the portfolio is constantly in flux as difficult decisions are made if a project, for example, is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority. Commitment to this difficult approach is necessary at all levels, and communication is required so everyone knows how their work contributes to the organization's strategic goals and objectives. Portfolio Management: Delivering on Strategy, Second Edition focuses on the benefits of portfolio management to the organization. Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy. The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective. Highlights of the book include: Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development, the book is a reference for executives and practitioners in the field, as well as a students and researchers studying portfolio management.

Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover): Nijaz... Enhancing Business Continuity and IT Capability - System Administration and Server Operating Platforms (Hardcover)
Nijaz Bajgoric, Lejla Turulja, Semir Ibrahimovic, Amra Alagic
R2,797 Discovery Miles 27 970 Ships in 12 - 17 working days

Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms proposes a new model of IT capability. It presents a framework that establishes the relationship between downtime on one side and business continuity and IT capability on the other side, as well as how system administration and modern server operating platforms can help in improving business continuity and IT capability. This book begins by defining business continuity and IT capability and their importance in modern business, as well as by giving an overview of business continuity, disaster recovery planning, contingency planning, and business continuity maturity models. It then explores modern server environments and the role of system administration in ensuring higher levels of system availability, system scalability, and business continuity. Techniques for enhancing availability and business continuity also include Business impact analysis Assessing the downtime impact Designing an optimal business continuity solution IT auditing as a process of gathering data and evidence to evaluate whether the company's information systems infrastructure is efficient and effective and whether it meets business goals The book concludes with frameworks and guidelines on how to measure and assess IT capability and how IT capability affects a firm's performances. Cases and white papers describe real-world scenarios illustrating the concepts and techniques presented in the book.

Augmented Intelligence Toward Smart Vehicular Applications (Hardcover): Nishu Gupta, Joel Rodrigues, Justin Dauwels Augmented Intelligence Toward Smart Vehicular Applications (Hardcover)
Nishu Gupta, Joel Rodrigues, Justin Dauwels
R3,985 Discovery Miles 39 850 Ships in 12 - 17 working days

This up-to-date reference discusses important concepts of vehicular communication in intelligent transportation systems. Augmented Intelligence Toward Smart Vehicular Applications begins by discussing key objectives of intelligent transport systems and vehicular ad-hoc networks (VANETs). It then goes on to discuss challenges, applications and future trends in VANETs. The text focuses on the organization of artificial intelligence (AI) and aspects of deep learning algorithms, particularly multimodal transport. This book will serve as an ideal reference for graduate students and academic researchers in the field of electrical engineering, electronics and communication engineering and transportation engineering. Features In-depth coverage of Internet of Things (IoT) in vehicular applications Discussion on nn-vehicle sensor networks Implementation of mobile IP and migration of IPv6 Focus on the need of AI in smart vehicular applications Discussions on advanced concepts in the field of intelligent transport systems

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems - The SHIELD Methodology (Paperback):... Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems - The SHIELD Methodology (Paperback)
Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
R1,879 Discovery Miles 18 790 Ships in 12 - 17 working days

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD philosophy, that relies on an overlay approach to SPD, on a methodology for composable SPD, on the use of semantics, and on the design of embedded systems with built-in SPD. The book explores new ground and illustrates the development of approximately forty prototypes capable of managing and enhancing SPD, including secure boot, trusted execution environments, adaptable radio interfaces, and different implementations of the middleware for measuring and composing SPD.

Beyond EHR - Using Technology to Meet Growing Demands and Deliver Better Patient Care (Paperback): Jeffery Daigrepont, EFPM,... Beyond EHR - Using Technology to Meet Growing Demands and Deliver Better Patient Care (Paperback)
Jeffery Daigrepont, EFPM, CAPPM
R1,857 Discovery Miles 18 570 Ships in 12 - 17 working days

Today, it is not uncommon for practices and hospitals to be on their second or third EHR and/or contemplating a transition from the traditional on-premise model to a cloud-based system. As a follow-up to Complete Guide and Toolkit to Successful EHR Adoption ( (c)2011 HIMSS), this book builds on the best practices of the first edition, fast-forwarding to the latest innovations that are currently leveraged and adopted by providers and hospitals. We examine the role that artificial intelligence (AI) is now playing in and around EHR technology. We also address the advances in analytics and deep learning (also known as deep structured or hierarchical learning) and explain this topic in practical ways for even the most novice reader to comprehend and apply. The challenges of EHR to EHR migrations and data conversions will also be covered, including the use of the unethical practice of data blocking used as a tactic by some vendors to hold data hostage. Further, we explore innovations related to interoperability, cloud computing, cyber security, and electronic patient/consumer engagement. Finally, this book will deal with what to do with aging technology and databases, which is an issue rarely considered in any of the early publications on healthcare technology. What is the proper way to retire a legacy system, and what are the legal obligations of data archiving? Though a lot has changed since the 2011 edition, many of the fundamentals remain the same and will serve as a foundation for the next generation of EHR adopters and/or those moving on to their second, third, fourth, and beyond EHRs.

Cyber Security Essentials (Hardcover): James Graham, Ryan Olson, Rick Howard Cyber Security Essentials (Hardcover)
James Graham, Ryan Olson, Rick Howard
R4,816 Discovery Miles 48 160 Ships in 9 - 15 working days

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish this, the team of security professionals from VeriSign's iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It's about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Business Intelligence and Big Data - Drivers of Organizational Success (Hardcover): Celina Olszak Business Intelligence and Big Data - Drivers of Organizational Success (Hardcover)
Celina Olszak
R2,345 Discovery Miles 23 450 Ships in 12 - 17 working days

The twenty-first century is a time of intensifying competition and progressive digitization. Individual employees, managers, and entire organizations are under increasing pressure to succeed. The questions facing us today are: What does success mean? Is success a matter of chance and luck or perhaps is success a category that can be planned and properly supported? Business Intelligence and Big Data: Drivers of Organizational Success examines how the success of an organization largely depends on the ability to anticipate and quickly respond to challenges from the market, customers, and other stakeholders. Success is also associated with the potential to process and analyze a variety of information and the means to use modern information and communication technologies (ICTs). Success also requires creative behaviors and organizational cleverness from an organization. The book discusses business intelligence (BI) and Big Data (BD) issues in the context of modern management paradigms and organizational success. It presents a theoretically and empirically grounded investigation into BI and BD application in organizations and examines such issues as: Analysis and interpretation of the essence of BI and BD Decision support Potential areas of BI and BD utilization in organizations Factors determining success with using BI and BD The role of BI and BD in value creation for organizations Identifying barriers and constraints related to BI and BD design and implementation The book presents arguments and evidence confirming that BI and BD may be a trigger for making more effective decisions, improving business processes and business performance, and creating new business. The book proposes a comprehensive framework on how to design and use BI and BD to provide organizational success.

Information Technology - An Introduction for Today's Digital World (Hardcover, 2nd edition): Richard Fox Information Technology - An Introduction for Today's Digital World (Hardcover, 2nd edition)
Richard Fox
R5,779 Discovery Miles 57 790 Ships in 12 - 17 working days

This revised edition has more breadth and depth of coverage than the first edition. Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts that they will encounter throughout their IT studies and careers. The features of this edition include: Introductory system administration coverage of Windows 10 and Linux (Red Hat 7), both as general concepts and with specific hands-on instruction Coverage of programming and shell scripting, demonstrated through example code in several popular languages Updated information on modern IT careers Computer networks, including more content on cloud computing Improved coverage of computer security Ancillary material that includes a lab manual for hands-on exercises Suitable for any introductory IT course, this classroom-tested text presents many of the topics recommended by the ACM Special Interest Group on IT Education (SIGITE). It offers a far more detailed examination of the computer and IT fields than computer literacy texts, focusing on concepts essential to all IT professionals - from system administration to scripting to computer organization. Four chapters are dedicated to the Windows and Linux operating systems so that students can gain hands-on experience with operating systems that they will deal with in the real world.

Clinical Surveillance - The Actionable Benefits of Objective Medical Device Data for Critical Decision-Making (Hardcover): John... Clinical Surveillance - The Actionable Benefits of Objective Medical Device Data for Critical Decision-Making (Hardcover)
John Zaleski
R4,139 Discovery Miles 41 390 Ships in 12 - 17 working days

For more than a decade, the focus of information technology has been on capturing and sharing data from a patient within an all-encompassing record (a.k.a. the electronic health record, EHR), to promote improved longitudinal oversight in the care of the patient. There are both those who agree and those who disagree as to whether this goal has been met, but it is certainly evolving. A key element to improved patient care has been the automated capture of data from durable medical devices that are the source of (mostly) objective data, from imagery to time-series histories of vital signs and spot-assessments of patients. The capture and use of these data to support clinical workflows have been written about and thoroughly debated. Yet, the use of these data for clinical guidance has been the subject of various papers published in respected medical journals, but without a coherent focus on the general subject of the clinically actionable benefits of objective medical device data for clinical decision-making purposes. Hence, the uniqueness of this book is in providing a single point-of-capture for the targeted clinical benefits of medical device data--both electronic- health-record-based and real-time--for improved clinical decision-making at the point of care, and for the use of these data to address and assess specific types of clinical surveillance. Clinical Surveillance: The Actionable Benefits of Objective Medical Device Data for Crucial Decision-Making focuses on the use of objective, continuously collected medical device data for the purpose of identifying patient deterioration, with a primary focus on those data normally obtained from both the higher-acuity care settings in intensive care units and the lower-acuity settings of general care wards. It includes examples of conditions that demonstrate earlier signs of deterioration including systemic inflammatory response syndrome, opioid-induced respiratory depression, shock induced by systemic failure, and more. The book provides education on how to use these data, such as for clinical interventions, in order to identify examples of how to guide care using automated durable medical device data from higher- and lower-acuity care settings. The book also includes real-world examples of applications that are of high value to clinical end-users and health systems.

Cloud VR - Technology and Application (Hardcover): Huaping Xiong, Dawei Li, Kun Huang, Mu Xu, Yin Huang, Lingling Xu, Jianfei... Cloud VR - Technology and Application (Hardcover)
Huaping Xiong, Dawei Li, Kun Huang, Mu Xu, Yin Huang, …
R3,551 Discovery Miles 35 510 Ships in 12 - 17 working days

Based on the technical accumulation and practice of Huawei iLab in the Cloud VR field, this book systematically describes the advantages of Cloud VR technologies; technical requirements on clouds, networks, and terminals as well as solution implementation; Cloud VR experience evaluation baselines and methods; and current business practices. Cloud VR introduces cloud computing and cloud rendering to VR services. With fast and stable networks, cloud-based display output and audio output are coded, compressed, and transmitted to user terminals, implementing cloud-based VR service content and content rendering. Cloud VR has stringent requirements on bandwidth and latency, making it a proficient application for 5G and gigabit home broadband networks in the era of "dual G". As the first advocate of Cloud VR, Huawei iLab developed the first prototype of the Cloud VR technical solution, initiated the industry's first Cloud VR industry cooperation plan - VR OpenLab with partners - and incubated the world's first Cloud VR commercial project with China Mobile Fujian. Cloud VR: Technology and Application is the first official publication of Huawei iLab's research and practice achievements. It systematically and thoroughly introduces the Cloud VR concept, solution architecture, key technologies, and business practices and is of great value in academic and social applications. This book is easy to understand, practical, and suitable for VR vendors, VR technology enthusiasts, carriers, network vendors, cloud service providers, universities, and other enterprises and scientific research institutes.

The Evolution of Business in the Cyber Age - Digital Transformation, Threats, and Security (Hardcover): Rahul Verma, Manisha... The Evolution of Business in the Cyber Age - Digital Transformation, Threats, and Security (Hardcover)
Rahul Verma, Manisha Mathur, Divya Gupta Chowdhry
R3,755 Discovery Miles 37 550 Ships in 9 - 15 working days

This book has a two-fold mission: to explain and facilitate digital transition in business organizations using information and communications technology and to address the associated growing threat of cyber crime and the challenge of creating and maintaining effective cyber protection. The book begins with a section on Digital Business Transformation, which includes chapters on tools for integrated marketing communications, human resource workplace digitalization, the integration of the Internet of Things in the workplace, Big Data, and more. The technologies discussed aim to help businesses and entrepreneurs transform themselves to align with today's modern digital climate. The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security provides a wealth of information for those involved in the development and management of conducting business online as well as for those responsible for cyber protection and security. Faculty and students, researchers, and industry professionals will find much of value in this volume.

Clinical Surveillance - The Actionable Benefits of Objective Medical Device Data for Critical Decision-Making (Paperback): John... Clinical Surveillance - The Actionable Benefits of Objective Medical Device Data for Critical Decision-Making (Paperback)
John Zaleski
R1,465 Discovery Miles 14 650 Ships in 12 - 17 working days

For more than a decade, the focus of information technology has been on capturing and sharing data from a patient within an all-encompassing record (a.k.a. the electronic health record, EHR), to promote improved longitudinal oversight in the care of the patient. There are both those who agree and those who disagree as to whether this goal has been met, but it is certainly evolving. A key element to improved patient care has been the automated capture of data from durable medical devices that are the source of (mostly) objective data, from imagery to time-series histories of vital signs and spot-assessments of patients. The capture and use of these data to support clinical workflows have been written about and thoroughly debated. Yet, the use of these data for clinical guidance has been the subject of various papers published in respected medical journals, but without a coherent focus on the general subject of the clinically actionable benefits of objective medical device data for clinical decision-making purposes. Hence, the uniqueness of this book is in providing a single point-of-capture for the targeted clinical benefits of medical device data--both electronic- health-record-based and real-time--for improved clinical decision-making at the point of care, and for the use of these data to address and assess specific types of clinical surveillance. Clinical Surveillance: The Actionable Benefits of Objective Medical Device Data for Crucial Decision-Making focuses on the use of objective, continuously collected medical device data for the purpose of identifying patient deterioration, with a primary focus on those data normally obtained from both the higher-acuity care settings in intensive care units and the lower-acuity settings of general care wards. It includes examples of conditions that demonstrate earlier signs of deterioration including systemic inflammatory response syndrome, opioid-induced respiratory depression, shock induced by systemic failure, and more. The book provides education on how to use these data, such as for clinical interventions, in order to identify examples of how to guide care using automated durable medical device data from higher- and lower-acuity care settings. The book also includes real-world examples of applications that are of high value to clinical end-users and health systems.

Cloud Network Management - An IoT Based Framework (Hardcover): Sanjay Kumar Biswash, Sourav Kanti Addya Cloud Network Management - An IoT Based Framework (Hardcover)
Sanjay Kumar Biswash, Sourav Kanti Addya
R3,556 Discovery Miles 35 560 Ships in 12 - 17 working days

Data storage, processing, and management at remote location over dynamic networks is the most challenging task in cloud networks. Users' expectations are very high for data accuracy, reliability, accessibility, and availability in pervasive cloud environment. It was the core motivation for the Cloud Networks Internet of Things (CNIoT). The exponential growth of the networks and data management in CNIoT must be implemented in fast growing service sectors such as logistic and enterprise management. The network based IoT works as a bridge to fill the gap between IT and cloud networks, where data is easily accessible and available. This book provides a framework for the next generation of cloud networks, which is the emerging part of 5G partnership projects. This contributed book has following salient features, A cloud-based next generation networking technologies. Cloud-based IoT and mobility management technology. The proposed book is a reference for research scholars and course supplement for cloud-IoT related subjects such as distributed networks in computer/ electrical engineering. Sanjay Kumar Biswash is working as an Assistant professor in NIIT University, India. He held Research Scientist position, Institute of Cybernetics, National Research Tomsk Polytechnic University, Russia. He was PDF at LNCC, Brazil and SDSU, USA. He was a visiting researcher to the UC, Portugal. Sourav Kanti Addya is working as an Assistant professor in NITK, Surathkal, India. He was a PDF at IIT Kharagpur, India. He was a visiting scholar at SDSU, USA. He obtained national level GATE scholarship. He is a member of IEEE, ACM.

Enterprise Architecture for Digital Business - Integrated Transformation Strategies (Hardcover): Tushar K. Hazra, Bhuvan... Enterprise Architecture for Digital Business - Integrated Transformation Strategies (Hardcover)
Tushar K. Hazra, Bhuvan Unhelkar
R1,962 Discovery Miles 19 620 Ships in 12 - 17 working days

Enterprise Architecture (EA) is an essential part of the fabric of a business; however, EA also transcends and transforms technology and moves it into the business space. Therefore, EA needs to be discussed in an integrated, holistic, and comprehensive manner. Only such an integrated approach to EA can provide the foundation for a transformation that readies the business for the myriad enterprise-wide challenges it will face. Highly disruptive technologies such as Big Data, Machine Learning, and Mobile and Cloud Computing require a fine balance between their business and technical aspects as an organization moves forward with its digital transformation. This book focuses on preparing all organizations - large and small - and those wishing to move into them for the impact of leveraging these emerging, disruptive, and innovative technologies within the EA framework.

AI-Centric Smart City Ecosystems - Technologies, Design and Implementation (Hardcover): Alex Khang, Sita Rani, Arun Kumar... AI-Centric Smart City Ecosystems - Technologies, Design and Implementation (Hardcover)
Alex Khang, Sita Rani, Arun Kumar Sivaraman
R3,557 Discovery Miles 35 570 Ships in 12 - 17 working days

Explains smart city ecosystem and AI-centric solutions Presents the application of design principles and computer vision models for operating smart cities and security systems Discusses how to integrate the AI-based controls systems to make the IoT devices smarter Explains data engineering and visualization patterns for monitoring smart city systems Discusses self-driving car models and transportation infrastructures

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Security+ Practice Tests - Exam…
M. Chapple Paperback R1,124 R907 Discovery Miles 9 070
8 Steps to Better Security - A Simple…
K Crawley Paperback R534 Discovery Miles 5 340
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
Linux Command Line and Shell Scripting…
R. Blum Paperback R980 Discovery Miles 9 800
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,347 Discovery Miles 13 470
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,364 R1,222 Discovery Miles 12 220
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270

 

Partners