0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (274)
  • R250 - R500 (876)
  • R500+ (13,585)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Next Generation Mobile Networks and Ubiquitous Computing (Hardcover): Samuel Pierre Next Generation Mobile Networks and Ubiquitous Computing (Hardcover)
Samuel Pierre
R4,574 Discovery Miles 45 740 Ships in 18 - 22 working days

Next Generation Mobile Networks and Ubiquitous Computing provides a comprehensive and unified view of the latest and most innovative research findings for university professors, researchers, students, and industry professionals alike. Presenting chapters by experts from across the globe, this reference offers a single body of knowledge to show the many existing interactions between mobile networking, wireless communications, and ubiquitous computing.

Security and the Networked Society (Hardcover, 2013 ed.): Mark A. Gregory, David Glance Security and the Networked Society (Hardcover, 2013 ed.)
Mark A. Gregory, David Glance
R2,733 R1,967 Discovery Miles 19 670 Save R766 (28%) Ships in 10 - 15 working days

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource.

Internetworking - Technological Foundations and Applications (Hardcover, 2013 ed.): Christoph Meinel, Harald Sack Internetworking - Technological Foundations and Applications (Hardcover, 2013 ed.)
Christoph Meinel, Harald Sack
R1,631 Discovery Miles 16 310 Ships in 18 - 22 working days

This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to high speed wireless WANs (WiMAX) and 4th generation wireless telephone networks LTE. Routing technologies conclude the treatment of the data link layer. Next, there is the Internet layer with the Internet protocol IP that establishes a virtual uniform network out of the net of heterogeneous networks. In detail, both versions, IPv4 as well as the successor IPv6 are covered in detail as well as ICMP, NDP, and Mobile IP. In the subsequent transport layer protocol functions are provided to offer a connection-oriented and reliable transport service on the basis of the simple and unreliable IP. The basic protocols TCP and UDP are introduced as well as NAT, the network address translation. Beside transport layer security protocols like SSL and TLS are presented. On the upmost application layer popular Internet application protocols are described like DNS, SMTP, PGP, (S)FTP, NFS, SSH, DHCP, SNMP, RTP, RTCP, RTSP, and World Wide Web.

Open Data Exposed (Hardcover, 1st ed. 2018): Bastiaan Van Loenen, Glenn Vancauwenberghe, Joep Crompvoets Open Data Exposed (Hardcover, 1st ed. 2018)
Bastiaan Van Loenen, Glenn Vancauwenberghe, Joep Crompvoets
R2,383 Discovery Miles 23 830 Ships in 10 - 15 working days

The main objectives of this book are to expose key aspects that have a relevance when dealing with open data viewed from different perspectives and to provide appealing examples of how open data is implemented worldwide. The concept of open data as we know it today is the result of many different initiatives, both of a legislative and non-legislative nature, and promoted by a wide range of actors. Numerous regulatory antecedents to foster the concept of open data and embed it in national and international policy agendas have been undertaken on both sides of the Atlantic, as well as at a supranational level. The book highlights a number of the efforts made to promote open data in Europe, Asia and the United States. In addition to new insights, practical guidance and multiple disciplinary perspectives on open data, the book also addresses the transformation of current developments towards open data, which may be referred to as the democratisation of data. This book will support open data practitioners as well as open data scholars in their endeavours to promote open data implementation and research. Bastiaan van Loenen is associate professor and director of the Knowledge Centre Open Data at the Faculty of Architecture and The Built Environment of Delft University of Technology in the Netherlands, as is Glenn Vancauwenberghe, who is a post-doctoral researcher, and Joep Crompvoets is a professor at the Public Governance Institute of the KU Leuven in Belgium.

Resilience Of Networked Infrastructure Systems, The: Analysis And Measurement (Hardcover): Mayada Omer Resilience Of Networked Infrastructure Systems, The: Analysis And Measurement (Hardcover)
Mayada Omer
R2,560 Discovery Miles 25 600 Ships in 18 - 22 working days

This volume elaborates on both the qualitative and quantitative aspects of resilience. Reviewing the literature exploring the concept of resilience in engineering, it discusses resilience in terms of the various definitions used, the methodologies proposed to characterize resilience, and the metrics put forward to quantify the resilience of specific service infrastructure systems. The review also identifies the key factors that contribute to organizational resilience. The concept of resilience is compared to other system properties such as reliability, robustness, flexibility and agility, by taking into consideration what systems are prepared against (types of failure), the causes of failure in systems (uncertainty), and how systems react to overcome failure (level of adaptability). A review is also provided of several resilience-enabling schemes, which improve resilience by reducing vulnerability and increasing adaptive capacity. The book puts forward a new framework, the Networked Infrastructure Resilience Assessment (NIRA) framework, through which the resilience of systems can be measured by assessing the impact of disruptions on key performance measures. By applying the framework to various case studies, the book demonstrates the ability of the proposed framework to assess resilience across a wide variety of networked infrastructure systems. The case studies probe the resilience of the following critical infrastructure systems in the face of specific disruptive events: telecommunication, transportation, maritime transportation and organizational networks. This text is intended for all levels of academia from undergraduate through to research level as well as professionals and decision-makers involved in the development, analysis and evaluation of infrastructure systems.

Symmetric Cryptographic Protocols (Hardcover, 2014 ed.): Mahalingam Ramkumar Symmetric Cryptographic Protocols (Hardcover, 2014 ed.)
Mahalingam Ramkumar
R4,151 R3,350 Discovery Miles 33 500 Save R801 (19%) Ships in 10 - 15 working days

This book focuseson protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees."

Enterprise Management Strategies in the Era of Cloud Computing (Hardcover): N. Raghavendra Rao Enterprise Management Strategies in the Era of Cloud Computing (Hardcover)
N. Raghavendra Rao
R5,316 Discovery Miles 53 160 Ships in 18 - 22 working days

Recent advances in internet architecture have led to the advent and subsequent explosion of cloud computing technologies, providing businesses with a powerful toolbox of collaborative digital resources. These technologies have fostered a more flexible, decentralized approach to IT infrastructure, enabling businesses to operate in a more agile fashion and on a globalized scale. Enterprise Management Strategies in the Era of Cloud Computing seeks to explore the possibilities of business in the cloud. Targeting an audience of research scholars, students, software developers, and business professionals, this premier reference source provides a cutting-edge look at the exciting and multifaceted relationships between cloud computing, software virtualization, collaborative technology, and business infrastructure in the 21st Century.

Information Science and Applications 2018 - ICISA 2018 (Hardcover, 1st ed. 2019): Kuinam J. Kim, Nakhoon Baek Information Science and Applications 2018 - ICISA 2018 (Hardcover, 1st ed. 2019)
Kuinam J. Kim, Nakhoon Baek
R7,093 Discovery Miles 70 930 Ships in 18 - 22 working days

This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.

The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback): Stephen D Gantz The Basics of IT Audit - Purposes, Processes, and Practical Information (Paperback)
Stephen D Gantz
R852 Discovery Miles 8 520 Ships in 10 - 15 working days

"The Basics of IT Audit: Purposes, Processes, and Practical Information" provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.

IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements.

This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
Provides a concise treatment of IT auditing, allowing you to prepare for, participate in, and respond to the resultsDiscusses the pros and cons of doing internal and external IT audits, including the benefits and potential drawbacks of eachCovers the basics of complex regulations and standards, such as Sarbanes-Oxley, SEC (public companies), HIPAA, and FFIECIncludes most methods and frameworks, including GAAS, COSO, COBIT, ITIL, ISO (27000), and FISCAM

Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback): Vinod Joseph,... Network Convergence - Ethernet Applications and Next Generation Packet Transport Architectures (Paperback)
Vinod Joseph, Srinivas Mulugu
R1,346 Discovery Miles 13 460 Ships in 10 - 15 working days

"Network Convergence: Ethernet Applications and Next Generation Packet Transport Architectures" provides the guidance and solutions you'll need to understand Ethernet and emerging applications such as cloud computing and mobile apps, as well as large-scale retail and business deployments.

This reference starts with an overview of the Ethernet and existing broadband architectures, including XDSL, WIMAX, and VLANs. It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP/MPLS layers, considered to be the backbone of next-generation packet transport architecture.

If you're a network designer or architect, a technical sales professional, or if you're pursuing technical certifications, you will benefit from "Network Convergence"'s fundamental information on this rapidly evolving technology.
Discusses architectural nuances and includes practical case studies for deploying the next-generation framework for each service type Explains data center and cloud computing interconnect schemes for building next-generation cloud infrastructures that support a new array of requirements Provides configuration schemes from leading vendors, including Cisco, Juniper and Alcatel

Unified Communications Forensics - Anatomy of Common UC Attacks (Paperback, New): Nicholas MR Grant, Joseph II Shaw Unified Communications Forensics - Anatomy of Common UC Attacks (Paperback, New)
Nicholas MR Grant, Joseph II Shaw
R968 Discovery Miles 9 680 Ships in 10 - 15 working days

"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

analysis of forensic artifacts in common UC attacks

an in-depth look at established UC technologies and attack exploits

hands-on understanding of UC attack vectors and associated countermeasures

companion website http: //secvoip.comgiving readers access to the most up-to-date information on UC attacks.

Provides key information for hackers and pen testers on the most current Unified Communications implementations.

The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.

Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "

Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016): Ehab Al-Shaer,... Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches (Hardcover, 1st ed. 2016)
Ehab Al-Shaer, Mohammad Ashiqur Rahman
R3,236 Discovery Miles 32 360 Ships in 18 - 22 working days

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner. This book includes three main sections. The first presents the idea of formally verifying the compliance of smart grid configurations with the security and resiliency guidelines. It provides a formal framework that verifies the compliance of the advanced metering infrastructure (AMI) configurations with the security and resiliency requirements, and generates remediation plans for potential security violations. The second section covers the formal verification of the security and resiliency of smart grid control systems by using a formal model to analyze attack evasions on state estimation, a core control module of the supervisory control system in smart grids. The model identifies attack vectors that can compromise state estimation. This section also covers risk mitigation techniques that synthesize proactive security plans that make such attacks infeasible. The last part of the book discusses the dynamic security analysis for smart grids. It shows that AMI behavior can be modeled using event logs collected at smart collectors, which in turn can be verified using the specification invariants generated from the configurations of the AMI devices. Although the focus of this book is smart grid security and resiliency, the included formal analytics are generic enough to be extended to other cyber-physical systems, especially those related to industrial control systems (ICS). Therefore, industry professionals and academic researchers will find this book an exceptional resource to learn theoretical and practical aspects of applying formal methods for the protection of critical infrastructures.

Cisco Security Specialists Guide to PIX Firewall (Paperback): Syngress Cisco Security Specialists Guide to PIX Firewall (Paperback)
Syngress
R1,836 Discovery Miles 18 360 Ships in 10 - 15 working days

Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more.
Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
OCoverage of the Latest Versions of PIX Firewalls. This book includes coverage of the latest additions to the PIX Firewall family including the CiscoSecure PIX Firewall (PIX) Software Release 6.0.
OMust-have desk reference for the serious security professional. In addition to the foundation information and dedicated text focused on the exam objectives for the CSPFA, this book offers real-world administration and configuration support. This book will not only help readers pass the exam; it will continue to assist them with their duties on a daily basis.
OFirewall administration guides? Syngress wrote the book. Syngress has demonstrated a proficiency to answer the market need for quality information pertaining to firewall administration guides. Configuring ISA Server 2000: Building Firewalls for Windows 2000 (ISBN: 1-928994-29-6) and Checkpoint Next Generation Security Administration (ISBN: 1-928994-74-1) are currently best sellers in the security market."

Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016): Rastko R. Selmic, Vir V Phoha, Abdul... Wireless Sensor Networks - Security, Coverage, and Localization (Hardcover, 1st ed. 2016)
Rastko R. Selmic, Vir V Phoha, Abdul Serwadda
R2,522 Discovery Miles 25 220 Ships in 10 - 15 working days

This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.

FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed): Laura P Taylor FISMA Compliance Handbook - Second Edition (Paperback, 2 Rev Ed)
Laura P Taylor
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. "FISMA Compliance Handbook Second Edition "explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.

Various topics discussed in this book include the NIST Risk Management Framework, how to characterize the sensitivity level of your system, contingency plan, system security plan development, security awareness training, privacy impact assessments, security assessments and more. Readers will learn how to obtain an Authority to Operate for an information system and what actions to take in regards to vulnerabilities and audit findings. "

FISMA Compliance Handbook Second Edition, "also includes all-new coverage of federal cloud computing compliance from author Laura Taylor, the federal government s technical lead for FedRAMP, the government program used to assess and authorize cloud products and services.
Includes new information on cloud computing compliance from Laura Taylor, the federal government s technical lead for FedRAMP

Includes coverage for both corporate and government IT managers

Learn how to prepare for, perform, and document FISMA compliance projects

This book is used by various colleges and universities in information security and MBA curriculums. "

Industrial Communications and Networks (Hardcover): Sharon Garner Industrial Communications and Networks (Hardcover)
Sharon Garner
R2,821 R2,566 Discovery Miles 25 660 Save R255 (9%) Ships in 18 - 22 working days
Information Protection Playbook (Paperback): Greg Kane, Lorna Koppel Information Protection Playbook (Paperback)
Greg Kane, Lorna Koppel
R1,457 Discovery Miles 14 570 Ships in 10 - 15 working days

The primary" "goal of the" Information Protection Playbook" is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy.

Using the guidelines provided in the "Information Protection Playbook," security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework.

The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP.

The "Information Protection Playbook" is a part of Elsevier s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standardsDraws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive CouncilIncludes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book"

Call Admission Control in Mobile Cellular Networks (Hardcover, 2013 ed.): Sanchita Ghosh, Amit Konar Call Admission Control in Mobile Cellular Networks (Hardcover, 2013 ed.)
Sanchita Ghosh, Amit Konar
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently. CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators. The second approach is concerned with formulation of CAC as an optimization problem to minimize call drop, satisfying a set of constraints on feasibility and availability of channels, hotness of cells, and velocity and angular displacement of mobile stations. Evolutionary techniques, including Genetic Algorithm and Biogeography Based Optimization, have been employed to solve the optimization problems. The proposed approaches outperform traditional methods with respect to grade and quality of services.

Foundations & Principles of Distributed Manufacturing - Elements of Manufacturing Networks, Cyber-Physical Production Systems... Foundations & Principles of Distributed Manufacturing - Elements of Manufacturing Networks, Cyber-Physical Production Systems and Smart Automation (Hardcover, 2015 ed.)
Hermann Kuhnle, Gunter Bitsch
R3,182 Discovery Miles 31 820 Ships in 18 - 22 working days

The book presents a coherent description of distributed manufacturing, providing a solid base for further research on the subject as well as smart implementations in companies. It provides a guide for those researching and working in a range of fields, such as smart manufacturing, cloud computing, RFID tracking, distributed automation, cyber physical production and global design anywhere, manufacture anywhere solutions. Foundations & Principles of Distributed Manufacturing anticipates future advances in the fields of embedded systems, the Internet of Things and cyber physical systems, outlining how adopting these innovations could rapidly bring about improvements in key performance indicators, which could in turn generate competition pressure by rendering successful business models obsolete. In laying the groundwork for powerful theoretical models, high standards for the homogeneity and soundness of the suggested setups are applied. The book especially elaborates on the upcoming competition in online manufacturing operations and respective control procedures. By outlining encapsulation and evolving decision-making principles, Foundations & Principles of Distributed Manufacturing fully conceptualizes the view of manufacturing networks as sets of loosely coupled interacting smart factory objects. Moreover, the book provides concrete approaches to a number of future fields, where distributed manufacturing might be applied. Both researchers and professionals will profit from the authors' broad experience in Distributed Manufacturing and Fractal Enterprise implementations, where they initiated and completed a number of successful research projects: within the global Intelligent Manufacturing Systems (IMS) scheme, within the European Research Area frameworks as well as national contexts, and both in industry and at leading research institutions. This background ensures well-founded theory on one hand and valuable practical results on the other in a fascinating area that is still under intensive research. Readers will acquire essential insights as well as useful guidance for categorizing and specifying extended distributed manufacturing solutions and their professional implementations.

Ruby Developers Guide (Paperback): Syngress Ruby Developers Guide (Paperback)
Syngress
R1,403 Discovery Miles 14 030 Ships in 10 - 15 working days

An expert guide to Ruby, a popular new Object-Oriented Programming Language
Ruby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.
Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby.
Ruby is currently experiencing a rapid rise in popularity in the object-oriented programming community
Readers receive up-to-the minute links, white papers, and analysis for two years at [email protected]
Comes with a wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular Ruby third-party programming tools and applications

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure (Paperback): Melissa M. Meyer, Michael Cross,... How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure (Paperback)
Melissa M. Meyer, Michael Cross, Hal Kurz, Brian Barber
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.
The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement.
The next book in our best selling and critically acclaimed How to Cheat series. This is the perfect book for users who have already purchased How to Cheat at Managing Windows 2003 Small Business Server.
* Active Directory is the market leader in the directory services space, and 57% of all Microsoft corporate customers have deployed AD
* Follows Syngress's proven "How To Cheat" methodology
* Companion Web site offers dozens of templates, "Cheat Sheets," and checklists for readers

Inventing the Cloud Century - How Cloudiness Keeps Changing Our Life, Economy and Technology (Hardcover, 1st ed. 2018): Marcus... Inventing the Cloud Century - How Cloudiness Keeps Changing Our Life, Economy and Technology (Hardcover, 1st ed. 2018)
Marcus Oppitz, Peter Tomsu
R2,538 Discovery Miles 25 380 Ships in 18 - 22 working days

This book combines the three dimensions of technology, society and economy to explore the advent of today's cloud ecosystems as successors to older service ecosystems based on networks. Further, it describes the shifting of services to the cloud as a long-term trend that is still progressing rapidly.The book adopts a comprehensive perspective on the key success factors for the technology - compelling business models and ecosystems including private, public and national organizations. The authors explore the evolution of service ecosystems, describe the similarities and differences, and analyze the way they have created and changed industries. Lastly, based on the current status of cloud computing and related technologies like virtualization, the internet of things, fog computing, big data and analytics, cognitive computing and blockchain, the authors provide a revealing outlook on the possibilities of future technologies, the future of the internet, and the potential impacts on business and society.

Information Technology in Organisations and Societies - Multidisciplinary Perspectives from AI to Technostress (Hardcover):... Information Technology in Organisations and Societies - Multidisciplinary Perspectives from AI to Technostress (Hardcover)
Zach W. Y. Lee, Tommy K. H. Chan, Christy M. K. Cheung
R2,825 Discovery Miles 28 250 Ships in 18 - 22 working days

Information technology (IT) use has generally been regarded as a positive phenomenon which always generates desirable outcomes. Recent years, however, have witnessed increasing negative consequences resulted from IT use. Emerging issues include individual users have experienced technostress from personal social media usage as well as IT use in the workplace; and organisations have experienced a loss in productivity and assets due to employees' non-compliance with information security policies.Themes explored throughout the book include: AI and its Implications for Organisations Augmented Reality Cognitive Absorption of Technology Information Technology in Organisations and Societies: Multidisciplinary Perspectives from AI to Technostress represents a collective effort that not only consolidates studies on key issues and phenomena concerning the positive and negative aspects of IT use but also prescribes future research avenues in related research domains. It is particularly relevant to academics and researchers working on IT use research and can be used as a handy reference guide by those working in the field.

Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New): Web Services Security Development and Architecture - Theoretical and Practical Issues (Hardcover, New)
R4,592 Discovery Miles 45 920 Ships in 18 - 22 working days

Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.

Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture,... Computer Networking - The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) (Hardcover)
Benjamin Walker
R570 R524 Discovery Miles 5 240 Save R46 (8%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Olympiad Online Test Package Class 5…
Shraddha Singh, Bunny Mehra Paperback R446 Discovery Miles 4 460
Advanced Data Mining Tools and Methods…
Sourav De, Sandip Dey, … Paperback R2,944 Discovery Miles 29 440
Interact with Information Technology 1…
Roland Birbal, Michele Taylor Paperback R762 Discovery Miles 7 620
Combinatorial Machine Learning - A Rough…
Mikhail Moshkov, Beata Zielosko Hardcover R2,752 Discovery Miles 27 520
BGE S1-S3 Computing Science and Digital…
David Alford Paperback R801 Discovery Miles 8 010
Oxford International Lower Secondary…
Alison Page Paperback R799 R199 Discovery Miles 1 990
Essential SQA Exam Practice: National 5…
Lesley Russell Paperback R382 Discovery Miles 3 820
Code-It: How To Teach Primary…
Phil Bagge Paperback R670 R590 Discovery Miles 5 900
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R7,962 Discovery Miles 79 620
Cambridge Primary Computing Learner's…
Roland Birbal, Michele Taylor, … Paperback R740 Discovery Miles 7 400

 

Partners