0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (319)
  • R250 - R500 (928)
  • R500+ (16,361)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Software Defined Networking - Design and Deployment (Paperback): Patricia A. Morreale, James M. Anderson Software Defined Networking - Design and Deployment (Paperback)
Patricia A. Morreale, James M. Anderson
R1,464 Discovery Miles 14 640 Ships in 12 - 17 working days

Software Defined Networking: Design and Deployment provides a comprehensive treatment of software defined networking (SDN) suitable for new network managers and experienced network professionals. Presenting SDN in context with more familiar network services and challenges, this accessible text: Explains the importance of virtualization, particularly the impact of virtualization on servers and networks Addresses SDN, with an emphasis on the network control plane Discusses SDN implementation and the impact on service providers, legacy networks, and network vendors Contains a case study on Google's initial implementation of SDN Investigates OpenFlow, the hand-in-glove partner of SDN Looks forward toward more programmable networks and the languages needed to manage these environments Software Defined Networking: Design and Deployment offers a unique perspective of the business case and technology motivations for considering SDN solutions. By identifying the impact of SDN on traffic management and the potential for network service growth, this book instills the knowledge needed to manage current and future demand and provisioning for SDN.

Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Hardcover)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R2,442 Discovery Miles 24 420 Ships in 12 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Large Scale Networks - Modeling and Simulation (Paperback): Radu Dobrescu, Florin Ionescu Large Scale Networks - Modeling and Simulation (Paperback)
Radu Dobrescu, Florin Ionescu
R2,169 Discovery Miles 21 690 Ships in 12 - 17 working days

This book offers a rigorous analysis of the achievements in the field of traffic control in large networks, oriented on two main aspects: the self-similarity in traffic behaviour and the scale-free characteristic of a complex network. Additionally, the authors propose a new insight in understanding the inner nature of things, and the cause-and-effect based on the identification of relationships and behaviours within a model, which is based on the study of the influence of the topological characteristics of a network upon the traffic behaviour. The effects of this influence are then discussed in order to find new solutions for traffic monitoring and diagnosis and also for traffic anomalies prediction. Although these concepts are illustrated using highly accurate, highly aggregated packet traces collected on backbone Internet links, the results of the analysis can be applied for any complex network whose traffic processes exhibit asymptotic self-similarity, perceived as an adaptability of traffic in networks. However, the problem with self-similar models is that they are computationally complex. Their fitting procedure is very time-consuming, while their parameters cannot be estimated based on the on-line measurements. In this aim, the main objective of this book is to discuss the problem of traffic prediction in the presence of self-similarity and particularly to offer a possibility to forecast future traffic variations and to predict network performance as precisely as possible, based on the measured traffic history.

Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover): Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong Cyber Defense Mechanisms - Security, Privacy, and Challenges (Hardcover)
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong
R5,330 Discovery Miles 53 300 Ships in 12 - 17 working days

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

Exam 70-414 Implementing an Advanced Server Infrastructure Lab Manual (Paperback): Microsoft Official Academic Course Exam 70-414 Implementing an Advanced Server Infrastructure Lab Manual (Paperback)
Microsoft Official Academic Course
R1,246 R209 Discovery Miles 2 090 Save R1,037 (83%) Out of stock

This is the Lab Manual to accompany Exam 70-414 Implementing an Advanced Server Infrastructure. This Microsoft Official Academic Course (MOAC) IT Professional curriculum prepares certification students for success every step of the way. This 70-414 Implementing an Advanced Server Infrastructure exam course is the second of a series of two exams Microsoft Certified Solutions Associates (MCSE) candidates are required to pass to gain the MCSE: Windows Server 2012 and Windows Server 2012 R2 certification. These MCSE exams test the skills and knowledge necessary to design, implement, and maintain a Windows Server 2012 infrastructure in an enterprise scaled, highly virtualized environment. Passing these exams confirms students ability to plan, configure, and implement the Windows Server 2012 services, such as server deployment, server virtualization, and network access and infrastructure. This complete ready-to-teach MOAC program is mapped to all of the exam objectives.

CASP+ CompTIA Advanced Security Practitioner Study  Guide - Exam CAS-004, Fourth Edition (Paperback, 4th Edition): NH Tanner CASP+ CompTIA Advanced Security Practitioner Study Guide - Exam CAS-004, Fourth Edition (Paperback, 4th Edition)
NH Tanner
R1,080 Discovery Miles 10 800 Ships in 12 - 17 working days

Prepare to succeed in your new cybersecurity career with the challenging and sought-after CASP+ credential In the newly updated Fourth Edition of CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-004, risk management and compliance expert Jeff Parker walks you through critical security topics and hands-on labs designed to prepare you for the new CompTIA Advanced Security Professional exam and a career in cybersecurity implementation. Content and chapter structure of this Fourth edition was developed and restructured to represent the CAS-004 Exam Objectives. From operations and architecture concepts, techniques and requirements to risk analysis, mobile and small-form factor device security, secure cloud integration, and cryptography, you'll learn the cybersecurity technical skills you'll need to succeed on the new CAS-004 exam, impress interviewers during your job search, and excel in your new career in cybersecurity implementation. This comprehensive book offers: Efficient preparation for a challenging and rewarding career in implementing specific solutions within cybersecurity policies and frameworks A robust grounding in the technical skills you'll need to impress during cybersecurity interviews Content delivered through scenarios, a strong focus of the CAS-004 Exam Access to an interactive online test bank and study tools, including bonus practice exam questions, electronic flashcards, and a searchable glossary of key terms Perfect for anyone preparing for the CASP+ (CAS-004) exam and a new career in cybersecurity, CASP+ CompTIA Advanced Security Practitioner Study Guide Exam CAS-004 is also an ideal resource for current IT professionals wanting to promote their cybersecurity skills or prepare for a career transition into enterprise cybersecurity.

Building Evolutionary Architectures - Support Constant Change (Paperback): Neal Ford, Rebecca Parsons, Patrick Kua Building Evolutionary Architectures - Support Constant Change (Paperback)
Neal Ford, Rebecca Parsons, Patrick Kua
R1,631 R1,004 Discovery Miles 10 040 Save R627 (38%) Out of stock

The software development ecosystem is constantly changing, providing a constant stream of new tools, frameworks, techniques, and paradigms. Over the past few years, incremental developments in core engineering practices for software development have created the foundations for rethinking how architecture changes over time, along with ways to protect important architectural characteristics as it evolves. This practical guide ties those parts together with a new way to think about architecture and time.

Cloud Native Security (Paperback): C. Binnie Cloud Native Security (Paperback)
C. Binnie
R728 Discovery Miles 7 280 Ships in 12 - 17 working days

Explore the latest and most comprehensive guide to securing your Cloud Native technology stack Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure. Throughout the work hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates. The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes. You'll also learn about: Installing and configuring multiple types of DevSecOps tooling in CI/CD pipelines Building a forensic logging system that can provide exceptional levels of detail, suited to busy containerized estates Securing the most popular container orchestrator, Kubernetes Hardening cloud platforms and automating security enforcement in the cloud using sophisticated policies Perfect for DevOps engineers, platform engineers, security professionals and students, Cloud Native Security will earn a place in the libraries of all professionals who wish to improve their understanding of modern security challenges.

Blockchain-enabled Fog and Edge Computing - Concepts, Architectures, and Applications (Hardcover): Muhammad Maaz Rehan,... Blockchain-enabled Fog and Edge Computing - Concepts, Architectures, and Applications (Hardcover)
Muhammad Maaz Rehan, Mubashir Husain Rehmani
R2,433 Discovery Miles 24 330 Ships in 12 - 17 working days

This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems. The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain. This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.

Information Technology - An Introduction for Today's Digital World (Hardcover, 2nd edition): Richard Fox Information Technology - An Introduction for Today's Digital World (Hardcover, 2nd edition)
Richard Fox
R5,779 Discovery Miles 57 790 Ships in 12 - 17 working days

This revised edition has more breadth and depth of coverage than the first edition. Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts that they will encounter throughout their IT studies and careers. The features of this edition include: Introductory system administration coverage of Windows 10 and Linux (Red Hat 7), both as general concepts and with specific hands-on instruction Coverage of programming and shell scripting, demonstrated through example code in several popular languages Updated information on modern IT careers Computer networks, including more content on cloud computing Improved coverage of computer security Ancillary material that includes a lab manual for hands-on exercises Suitable for any introductory IT course, this classroom-tested text presents many of the topics recommended by the ACM Special Interest Group on IT Education (SIGITE). It offers a far more detailed examination of the computer and IT fields than computer literacy texts, focusing on concepts essential to all IT professionals - from system administration to scripting to computer organization. Four chapters are dedicated to the Windows and Linux operating systems so that students can gain hands-on experience with operating systems that they will deal with in the real world.

Testing and Securing Web Applications (Paperback): Ravi Das, Greg Johnson Testing and Securing Web Applications (Paperback)
Ravi Das, Greg Johnson
R1,678 Discovery Miles 16 780 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Testing and Securing Web Applications (Hardcover): Ravi Das, Greg Johnson Testing and Securing Web Applications (Hardcover)
Ravi Das, Greg Johnson
R3,994 Discovery Miles 39 940 Ships in 12 - 17 working days

Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don't touch a front end or a back end; today's web apps impact just about every corner of it. Today's web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a result, web apps must be literally tested from the inside and out in terms of security before they can be deployed and launched to the public for business transactions to occur. The primary objective of this book is to address those specific areas that require testing before a web app can be considered to be completely secure. The book specifically examines five key areas: Network security: This encompasses the various network components that are involved in order for the end user to access the particular web app from the server where it is stored at to where it is being transmitted to, whether it is a physical computer itself or a wireless device (such as a smartphone). Cryptography: This area includes not only securing the lines of network communications between the server upon which the web app is stored at and from where it is accessed from but also ensuring that all personally identifiable information (PII) that is stored remains in a ciphertext format and that its integrity remains intact while in transmission. Penetration testing: This involves literally breaking apart a Web app from the external environment and going inside of it, in order to discover all weaknesses and vulnerabilities and making sure that they are patched before the actual Web app is launched into a production state of operation. Threat hunting: This uses both skilled analysts and tools on the Web app and supporting infrastructure to continuously monitor the environment to find all security holes and gaps. The Dark Web: This is that part of the Internet that is not openly visible to the public. As its name implies, this is the "sinister" part of the Internet, and in fact, where much of the PII that is hijacked from a web app cyberattack is sold to other cyberattackers in order to launch more covert and damaging threats to a potential victim. Testing and Securing Web Applications breaks down the complexity of web application security testing so this critical part of IT and corporate infrastructure remains safe and in operation.

Cyber Security Education - Principles and Policies (Hardcover): Greg Austin Cyber Security Education - Principles and Policies (Hardcover)
Greg Austin
R4,147 Discovery Miles 41 470 Ships in 12 - 17 working days

This book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges. The past ten years have seen a tectonic shift in the significance of cyber security education. Once the preserve of small groups of dedicated educators and industry professionals, the subject is now on the frontlines of geopolitical confrontation and business strategy. Global shortages of talent have created pressures on corporate and national policy for workforce development. Cyber Security Education offers an updated approach to the subject as we enter the next decade of technological disruption and political threats. The contributors include scholars and education practitioners from leading research and education centres in Europe, North America and Australia. This book provides essential reference points for education policy on the new social terrain of security in cyberspace and aims to reposition global debates on what education for security in cyberspace can and should mean. This book will be of interest to students of cyber security, cyber education, international security and public policy generally, as well as practitioners and policy-makers.

Big Data, IoT, and Machine Learning - Tools and Applications (Hardcover): Rashmi Agrawal, Marcin Paprzycki, Neha Gupta Big Data, IoT, and Machine Learning - Tools and Applications (Hardcover)
Rashmi Agrawal, Marcin Paprzycki, Neha Gupta
R4,445 Discovery Miles 44 450 Ships in 12 - 17 working days

The idea behind this book is to simplify the journey of aspiring readers and researchers to understand Big Data, IoT and Machine Learning. It also includes various real-time/offline applications and case studies in the fields of engineering, computer science, information security and cloud computing using modern tools. This book consists of two sections: Section I contains the topics related to Applications of Machine Learning, and Section II addresses issues about Big Data, the Cloud and the Internet of Things. This brings all the related technologies into a single source so that undergraduate and postgraduate students, researchers, academicians and people in industry can easily understand them. Features Addresses the complete data science technologies workflow Explores basic and high-level concepts and services as a manual for those in the industry and at the same time can help beginners to understand both basic and advanced aspects of machine learning Covers data processing and security solutions in IoT and Big Data applications Offers adaptive, robust, scalable and reliable applications to develop solutions for day-to-day problems Presents security issues and data migration techniques of NoSQL databases

Cyber Security Education - Principles and Policies (Paperback): Greg Austin Cyber Security Education - Principles and Policies (Paperback)
Greg Austin
R1,188 Discovery Miles 11 880 Ships in 12 - 17 working days

This book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges. The past ten years have seen a tectonic shift in the significance of cyber security education. Once the preserve of small groups of dedicated educators and industry professionals, the subject is now on the frontlines of geopolitical confrontation and business strategy. Global shortages of talent have created pressures on corporate and national policy for workforce development. Cyber Security Education offers an updated approach to the subject as we enter the next decade of technological disruption and political threats. The contributors include scholars and education practitioners from leading research and education centres in Europe, North America and Australia. This book provides essential reference points for education policy on the new social terrain of security in cyberspace and aims to reposition global debates on what education for security in cyberspace can and should mean. This book will be of interest to students of cyber security, cyber education, international security and public policy generally, as well as practitioners and policy-makers.

An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Hardcover): Nikos Daskalakis, Panagiotis Georgitseas An Introduction to Cryptocurrencies - The Crypto Market Ecosystem (Hardcover)
Nikos Daskalakis, Panagiotis Georgitseas
R3,523 Discovery Miles 35 230 Ships in 12 - 17 working days

The Crypto Market Ecosystem has emerged as the most profound application of blockchain technology in finance. This textbook adopts an integrated approach, linking traditional functions of the current financial system (payments, traded assets, fundraising, regulation) with the respective functions in the crypto market, in order to facilitate the reader in their understanding of how this new ecosystem works. The book walks the reader through the main features of the blockchain technology, the definitions, classifications, and distinct characteristics of cryptocurrencies and tokens, how these are evaluated, how funds are raised in the cryptocurrency ecosystem (ICOs), and what the main regulatory approaches are. The authors have compiled more than 100 sources from different sub-fields of economics, finance, and regulation to create a coherent textbook that provides the reader with a clear and easily understandable picture of the new world of encrypted finance and its applications. The book is primarily aimed at business and finance students, who already have an understanding of the basic principles of how the financial system works, but also targets a more general readership, by virtue of its broader scope and engaging and accessible tone.

Swarm Intelligence for Cloud Computing (Hardcover): Indrajit Pan, Mohamed Abd Elaziz, Siddhartha Bhattacharyya Swarm Intelligence for Cloud Computing (Hardcover)
Indrajit Pan, Mohamed Abd Elaziz, Siddhartha Bhattacharyya
R3,245 Discovery Miles 32 450 Ships in 12 - 17 working days

Swarm Intelligence in Cloud Computing is an invaluable treatise for researchers involved in delivering intelligent optimized solutions for reliable deployment, infrastructural stability, and security issues of cloud-based resources. Starting with a bird's eye view on the prevalent state-of-the-art techniques, this book enriches the readers with the knowledge of evolving swarm intelligent optimized techniques for addressing different cloud computing issues including task scheduling, virtual machine allocation, load balancing and optimization, deadline handling, power-aware profiling, fault resilience, cost-effective design, and energy efficiency. The book offers comprehensive coverage of the most essential topics, including: Role of swarm intelligence on cloud computing services Cloud resource sharing strategies Cloud service provider selection Dynamic task and resource scheduling Data center resource management. Indrajit Pan is an Associate Professor in Information Technology of RCC Institute of Information Technology, India. He received his PhD from Indian Institute of Engineering Science and Technology, Shibpur, India. With an academic experience of 14 years, he has published around 40 research publications in different international journals, edited books, and conference proceedings. Mohamed Abd Elaziz is a Lecturer in the Mathematical Department of Zagazig University, Egypt. He received his PhD from the same university. He is the author of more than 100 articles. His research interests include machine learning, signal processing, image processing, cloud computing, and evolutionary algorithms. Siddhartha Bhattacharyya is a Professor in Computer Science and Engineering of Christ University, Bangalore. He received his PhD from Jadavpur University, India. He has published more than 230 research publications in international journals and conference proceedings in his 20 years of academic experience.

Product Lifecycle Management (PLM) - A Digital Journey Using Industrial Internet of Things (IIoT) (Hardcover): Uthayan Elangovan Product Lifecycle Management (PLM) - A Digital Journey Using Industrial Internet of Things (IIoT) (Hardcover)
Uthayan Elangovan
R2,837 Discovery Miles 28 370 Ships in 12 - 17 working days

As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts. Winning the spot of #19 out of 26 on the 2020 Bookauthority Best New Industrial Management Books of All Time. Winning the spot of #3 out of 8 on the 2021 Bookauthority Best New Industrial Management Books to Read in 2021. Winning the spot of #5 out of 11 on the 2021 Bookauthority Best New Product Design Books to Read in 2021. 2020 Taylor & Francis Award Winner for Outstanding Professional Book! Product Lifecycle Management (PLM): A Digital Journey Using Industrial Internet of Things (IIot) provides a summary of the essential topics of Product Lifecycle Management (PLM) and the Industrial Internet of Things (IIoT) in the era of Industry 4.0. The book discusses emerging technologies, their contribution towards enhancing product design, development, and manufacturing. It also presents the integration of PLM, Enterprise Resource Planning (ERP), and Manufacturing Execution System (MES) along with IIoT as well the integration of mechanical, electronic components, embedded systems, firmware and software focusing on smart design, development, and manufacturing in the digital transformation journey. The book provides a high-level overview of how the smart product development through smart manufacturing materializes within the smart ecosystem. Manufacturing professionals, designers, mechanical, electrical, electronics, instrumentation and industrial engineers, information and communication technology consultants and those working in production planning, process control, and operations will find this book invaluable.

Mobile Evolution - Insights on Connectivity and Service (Paperback): Sebastian Thalanany Mobile Evolution - Insights on Connectivity and Service (Paperback)
Sebastian Thalanany
R1,451 Discovery Miles 14 510 Ships in 12 - 17 working days

This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and service-that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art. Mobile Evolution: Insights on Connectivity and Service explores the forward-looking and enabling capabilities of mobile connectivity and service in the context of long term evolution (LTE) systems and multimedia services, as viewed through a lens of human experience. It provides information and guidelines pertaining to the strategies and technologies associated with the next-generation mobile ecosystem. The book examines the intersection between the technology and the human dimension in the context of the ever-changing landscape. It arms you with ideas that you can apply to design, innovation, strategy, and business models for the various facets of mobile communication connectivity and service.

Introduction to Communications Technologies - A Guide for Non-Engineers, Third Edition (Paperback, 3rd edition): Ronald J.... Introduction to Communications Technologies - A Guide for Non-Engineers, Third Edition (Paperback, 3rd edition)
Ronald J. Kovac, Frank M. Groom, Stephan Jones
R1,460 Discovery Miles 14 600 Ships in 12 - 17 working days

Thanks to the advancement of faster processors within communication devices, there has been a rapid change in how information is modulated, multiplexed, managed, and moved. While formulas and functions are critical in creating the granular components and operations of individual technologies, understanding the applications and their purposes in the business environment only requires a basic scientific background. The third edition of Introduction to Communications Technologies: A Guide for Non-Engineers helps students in telecommunications business programs become familiar with and stay abreast of the ever-changing technology surrounding their industry. Used in the core curriculum at Ball State University's graduate professional program in Information and Communication Sciences, this textbook is designed for graduate and undergraduate students who do not necessarily have a high level of technical expertise, but need to have some understanding of the technical functions of information and communication technologies to prepare them for working in a corporate environment. See What's New in the Third Edition: Significant updates to the following chapters: Modulation Schemes; Signaling Formats, Multiplexing, and Digital Transmission; Packet Switching and Local Area Networks; Mobile Wireless Technologies; Network Security and Management Added coverage of OFDMA, Metro Ethernet, 5G pre-standard configuration, 'apps' on mobile devices, and VoIP core switching New chapters on Big Data and the Cloud Avoiding complicated equations and the need for calculus gymnastics, this textbook provides non-engineering students with a firm background and a broad understanding of the knowledge necessary to work within the fast-paced and ever-changing communications industry.

Securing Cyber-Physical Systems (Paperback): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Paperback)
Al-Sakib Khan Pathan
R1,472 Discovery Miles 14 720 Ships in 12 - 17 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

Wireless Sensor Multimedia Networks - Architectures, Protocols, and Applications (Paperback): Mohamed Mostafa A. Azim, Xiaohong... Wireless Sensor Multimedia Networks - Architectures, Protocols, and Applications (Paperback)
Mohamed Mostafa A. Azim, Xiaohong Jiang
R1,451 Discovery Miles 14 510 Ships in 12 - 17 working days

Wireless sensor networks (WSNs) are a special class of ad hoc network in which network nodes composed of tiny sensors pass data such as temperature, pressure, and humidity through the network to a central location. Wireless sensor multimedia networks (WSMNs) are a special category of WSNs in which the sensor nodes are small cameras and microphones that can send voice, image, or video data through the network. This book presents the latest advances and research in WSMN architecture, algorithms, and protocols. WSMNs are attracting great attention from academia and industry due to the variety of applications in which they can be deployed. Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications explores the many benefits of WSMNs and the variety of applications in which they can be used-surveillance, traffic monitoring, advanced healthcare (blood pressure and heart rate monitoring), habitat monitoring, and localization services (finding missing children or wanted criminals). The contributed chapters in this book explore current research into key areas such as New quality-of-service-aware routing protocols that support a high data rate in WSMNs Cognitive radio capability that increases efficiency of spectrum utilization and decreases the probability of collision and contention Multimedia streaming optimization techniques New security schemes for real-time video streaming Various ways of optimizing power consumption in WSMNs Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications discusses open research issues and future trends in WSMNs. With this book, academic researchers, engineers, and graduate students will be well-equipped to advance the research in this emerging field.

Cable and Wireless Networks - Theory and Practice (Paperback): Mario Marques da Silva Cable and Wireless Networks - Theory and Practice (Paperback)
Mario Marques da Silva
R1,511 Discovery Miles 15 110 Ships in 12 - 17 working days

Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, cable and wireless communications, and networking security. It describes the most important state-of-the-art fundamentals and system details in the field, as well as many key aspects concerning the development and understanding of current and emergent services. In this book, the author gathers in a single volume current and emergent cable and wireless network services and technologies. Unlike other books, which cover each one of these topics independently without establishing their natural relationships, this book allows students to quickly learn and improve their mastering of the covered topics with a deeper understanding of their interconnection. It also collects in a single source the latest developments in the area, typically only within reach of an active researcher. Each chapter illustrates the theory of cable and wireless communications with relevant examples, hands-on exercises, and review questions suitable for readers with a BSc degree or an MSc degree in computer science or electrical engineering. This approach makes the book well suited for higher education students in courses such as networking, telecommunications, mobile communications, and network security. This is an excellent reference book for academic, institutional, and industrial professionals with technical responsibilities in planning, design and development of networks, telecommunications and security systems, and mobile communications, as well as for Cisco CCNA and CCNP exam preparation.

Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback): Fei Hu Security and Privacy in Internet of Things (IoTs) - Models, Algorithms, and Implementations (Paperback)
Fei Hu
R1,495 Discovery Miles 14 950 Ships in 12 - 17 working days

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.

Mobile Ad Hoc Networks - Bio-Inspired Quality of Service Aware Routing Protocols (Paperback): G. Ram Mohana Reddy, Kiran M Mobile Ad Hoc Networks - Bio-Inspired Quality of Service Aware Routing Protocols (Paperback)
G. Ram Mohana Reddy, Kiran M
R1,465 Discovery Miles 14 650 Ships in 12 - 17 working days

In recent years, a lot of work has been done in an effort to incorporate Swarm Intelligence (SI) techniques in building an adaptive routing protocol for Mobile Ad Hoc Networks (MANETs). Since centralized approach for routing in MANETs generally lacks in scalability and fault-tolerance, SI techniques provide a natural solution through a distributed approach for the adaptive routing for MANETs. In SI techniques, the captivating features of insects or mammals are correlated with the real world problems to find solutions. Recently, several applications of bio-inspired and nature-inspired algorithms in telecommunications and computer networks have achieved remarkable success. The main aims/objectives of this book, "Mobile Ad Hoc Networks: Bio-Inspired Quality of Service Aware Routing Protocols", are twofold; firstly it clearly distinguishes between principles of traditional routing protocols and SI based routing protocols, while explaining in detail the analogy between MANETs and SI principles. Secondly, it presents the readers with important Quality of Service (QoS) parameters and explains how SI based routing protocols achieves QoS demands of the applications. This book also gives quantitative and qualitative analysis of some of the SI based routing protocols for MANETs.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640
8 Steps to Better Security - A Simple…
K Crawley Paperback R534 Discovery Miles 5 340
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,949 Discovery Miles 29 490
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560

 

Partners