0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (327)
  • R250 - R500 (865)
  • R500+ (14,041)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

CompTIA Server+ Study Guide - Exam SK0-005 2nd Edition (Paperback): T. McMillan CompTIA Server+ Study Guide - Exam SK0-005 2nd Edition (Paperback)
T. McMillan
R1,387 R1,051 Discovery Miles 10 510 Save R336 (24%) Ships in 12 - 17 working days

Prepare for the Server+ exam--and an exciting new career in tech--with this hands-on guide In the newly updated Second Edition of the CompTIA Server+ Study Guide: Exam SK0-005, veteran technology educator Troy McMillan delivers a comprehensive, hands-on blueprint for success on the Server+ SK0-005 exam. Learn about essential hardware and software technologies used in on-premise and hybrid server environments and prepare yourself for the exam and real-world, on-the-job challenges. This Study Guide provides you with a solid understanding of how network and cloud storage systems work by helping you learn how to store, protect, and access the data that's ever more crucial to modern businesses. Find coverage of every objective tested by the exam, including server hardware installation and management, server administration, security and disaster recovery, and troubleshooting. You also learn: Expert guidance on acing a certification exam is increasing demand amongst high-paying employers Critical performance tips for professionals who want to hit the ground running on their first day on the job Complimentary access to the Sybex interactive online learning environment and test bank, complete with hundreds of practice questions and answers, bonus exams, electronic flashcards, and a searchable glossary of key terms A can't-miss resource for anyone preparing for a new role as a server administrator, data storage specialist, or related IT specialty, the CompTIA Server+ Study Guide: Exam SK0-005, Second Edition, will earn a place in the libraries of anyone looking for an efficient and effective way to prep for this challenging and rewarding technical certification.

Cyber-Physical Threat Intelligence for Critical Infrastructures Security - A Guide to Integrated Cyber-Physical Protection of... Cyber-Physical Threat Intelligence for Critical Infrastructures Security - A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures (Hardcover)
John Soldatos, James Philpot, Gabriele Giunta
R2,446 Discovery Miles 24 460 Ships in 10 - 15 working days

Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.

CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition): Glen Clarke CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) (Paperback, 4th edition)
Glen Clarke
R916 Discovery Miles 9 160 Ships in 12 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This fully updated self-study guide offers 100% coverage of every objective on the CompTIA Security+ exam This highly effective test preparation guide covers every objective for the latest version of the CompTIA Security+ exam (exam SY0-601). Written by CompTIA training expert Glen E. Clarke, this new edition has been thoroughly revised to align with the 2020 update to the exam. "Exam Watch" and "On-the-Job" special elements reinforce salient points throughout. With hundreds of practice exam questions, including difficult performance-based questions, CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) covers what you need to know and shows you how to prepare for the challenging exam. The book features chapter-ending self-tests along with in-depth explanations for the correct and incorrect answers. All questions closely match those on the live test in content, format, tone, and feel. Online content includes more than 400 practice questions, a lab exercises PDF, video training from the author, and performance-based question simulations Includes a 10% off exam voucher coupon, a $35 value Written by a CompTIA certification expert and experienced author

Data Mining in Dynamic Social Networks and Fuzzy Systems (Hardcover, New): Vishal Bhatnagar Data Mining in Dynamic Social Networks and Fuzzy Systems (Hardcover, New)
Vishal Bhatnagar
R5,310 Discovery Miles 53 100 Ships in 12 - 17 working days

Many organizations, whether in the public or private sector, have begun to take advantage of the tools and techniques used for data mining. Utilizing data mining tools, these organizations are able to reveal the hidden and unknown information from available data. Data Mining in Dynamic Social Networks and Fuzzy Systems brings together research on the latest trends and patterns of data mining tools and techniques in dynamic social networks and fuzzy systems. With these improved modern techniques of data mining, this publication aims to provide insight and support to researchers and professionals concerned with the management of expertise, knowledge, information, and organizational development.

The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R1,127 Discovery Miles 11 270 Ships in 9 - 15 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

Open Source for Knowledge and Learning Management - Strategies Beyond Tools (Hardcover): Open Source for Knowledge and Learning Management - Strategies Beyond Tools (Hardcover)
R2,787 Discovery Miles 27 870 Ships in 12 - 17 working days

In the last years, knowledge and learning management have made a significant impact on the IT research community. ""Open Source for Knowledge and Learning Management: Strategies Beyond Tools"" presents learning and knowledge management from a point of view where the basic tools and applications are provided by open source technologies. ""Open Source for Knowledge and Learning Management: Strategies Beyond Tools"" explains an intense orientation to the critical issues of the open source paradigm: open source tools, applications, social networks, and knowledge sharing in open source communities. Open source technologies, tools, and applications are analyzed in the context of knowledge and learning, and this convergence formulates a challenging landscape for the deployment of information technology.

Building an Information Security Awareness Program (Paperback): Mark B. Desman Building an Information Security Awareness Program (Paperback)
Mark B. Desman
R2,942 Discovery Miles 29 420 Ships in 12 - 17 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.
Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Cases on Telecommunications and Networking (Hardcover, illustrated edition): Mehdi Khosrowpour Cases on Telecommunications and Networking (Hardcover, illustrated edition)
Mehdi Khosrowpour
R2,391 Discovery Miles 23 910 Ships in 12 - 17 working days

Cases on Telecommunications and Networking presents a wide range of the most current issues related to the planning, design, maintenance, and management of telecommunications and networking technologies and applications in organizations. Real-life cases included in this publication clearly illustrate challenges and solutions associated with the effective utilization and management of telecommunications and networking technologies in modern organizations worldwide. ""Cases on Telecommunications and Networking"" provides practitioners, educators, and students with important examples of successes and failures in telecommunications and networking systems implementation. This publication is instrumental for those learning about the issues and challenges in the field of telecommunications and networking systems.

Cloud Computing For Dummies, Second Edition (Paperback, 2nd Edition): JS Hurwitz Cloud Computing For Dummies, Second Edition (Paperback, 2nd Edition)
JS Hurwitz
R869 R651 Discovery Miles 6 510 Save R218 (25%) Ships in 9 - 15 working days

Get your head--and your business--into the Cloud Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it's become a real and important part of our information architecture--and tech professionals who ignore it or try to skim their way through risk falling behind rapidly. The new edition of Cloud Computing For Dummies gets you up to speed fast, clarifying your Cloud options, showing you where can save you time and money, giving you ways to frame your decisions, and helping you avoid weeks of research. In a friendly, easy-to-follow style, Cloud Computing For Dummies, 2nd Edition demystifies the Cloud's virtual landscape, breaking up a complex and multi-layered topic into simple explanations that will make the various benefits clear and ultimately guide you toward making the most appropriate choices for your organization. Know the business case for the Cloud Understand hybrid and multi-cloud options Develop your Cloud strategy Get tips on best practices The Cloud is everywhere, and it can deliver amazing benefits to our lives and businesses. Get a much clearer vision of exactly how with Cloud Computing For Dummies--and you'll begin to see that the sky really is the limit!

Mobile Peer-to-peer Computing for Next Generation Distributed Environments - Advancing Conceptual and Algorithmic Applications... Mobile Peer-to-peer Computing for Next Generation Distributed Environments - Advancing Conceptual and Algorithmic Applications (Hardcover)
Boon-Chong Seet
R5,337 Discovery Miles 53 370 Ships in 12 - 17 working days

Peer-to-peer computing has gained significant attention from both industry and research communities in the past decade as the number of users worldwide continues to grow along with demand for mobile computing. Mobile Peer-to-Peer Computing for Next Generation Distributed Environments: Advancing Conceptual and Algorithmic Applications focuses on current research and innovation in mobile and wireless technologies that address challenges from both a theoretical and applied perspective. This advanced publication provides researchers, practitioners, and academicians with an authoritative reference source to the latest state-of-the-art developments in this growing technology field.

Analyzing US Census Data - Methods, Maps, and Models in R (Paperback): Kyle Walker Analyzing US Census Data - Methods, Maps, and Models in R (Paperback)
Kyle Walker
R1,742 Discovery Miles 17 420 Ships in 9 - 15 working days

Access US Census Bureau geographic and demographic data directly within R. Wrangle Census data with tidyverse tools and work with margins of error in the American Community Survey. Make maps and interactive web visualizations with US Census data. Explore Census data with spatial analysis using the sf package. Integrate Census data into spatial and machine learning models.

Security Architecture - How & Why (Hardcover): Tom Madsen Security Architecture - How & Why (Hardcover)
Tom Madsen
R2,865 Discovery Miles 28 650 Ships in 9 - 15 working days

Security Architecture, or Enterprise Information security architecture, as it was originally coined by Gartner back in 2006, has been applied to many things and different areas, making a concrete definition of Security architecture a difficult proposition. But having an architecture for the cyber security needs of an organization is important for many reasons, not least because having an architecture makes working with cyber security a much easier job, since we can now build on a, hopefully, solid foundation. Developing a security architecture is a daunting job, for almost anyone, and in a company that has not had a cyber security program implemented before, the job becomes even harder. The benefits of having a concrete cyber security architecture in place cannot be overstated! The challenge here is that a security architecture is not something that can stand alone, it absolutely must be aligned with the business in which is being implemented. This book emphasizes the importance, and the benefits, of having a security architecture in place. The book will be aligned with most of the sub frameworks in the general framework called SABSA, or Sherwood Applied Business Security Architecture. SABSA is comprised of several individual frameworks and there are several certifications that you can take in SABSA. Aside from getting a validation of your skills, SABSA as a framework focusses on aligning the Security Architecture with the business and its strategy. Each of the chapters in this book will be aligned with one or more of the components in SABSA, the components will be described along with the introduction to each of the chapters.

6G Enabling Technologies - New Dimensions to Wireless Communication (Hardcover): Ramjee Prasad, Anand Raghawa Prasad, Albena... 6G Enabling Technologies - New Dimensions to Wireless Communication (Hardcover)
Ramjee Prasad, Anand Raghawa Prasad, Albena Mihovska, Nidhi
R3,104 Discovery Miles 31 040 Ships in 9 - 15 working days

The sixth generation of wireless communication (6G), succeeding 5G cellular technology, opens up several possibilities in terms of technology and its offered services. 6G is expected to allow usage of available higher frequency spectrums to cater to increased capacity, throughput, and low latency (<1 µs). 6G will witness the unification of various technologies, such as artificial intelligence (AI), machine learning (ML), augmented/virtual reality (AR/VR), etc., to provide an immersive user experience. It is foreseen as the accelerator of transformation and innovation globally. To make this book a fundamental resource, we have invited world-renowned experts in 6G from the industry and academia to pen down their ideas on different aspects of 6G research. The chapters in this book cover a broader scope and various related and unrelated verticals. Specifically, this book covers the following topics: 6G use cases, requirements, and enabling technologies new spectrums and their challenges for 6G privacy preservation in 6G networks aerial infrastructure for 6G networks economic challenges associated with 6G wireless networks. The encompassing intent of this book is to explore the evolution from current 5G networks towards the future 6G networks from a service, air interface, and network perspective, thereby laying out a vision for 6G networks.

Security and Privacy From a Legal, Ethical, and Technical Perspective (Hardcover): Christos Kalloniatis, Carlos... Security and Privacy From a Legal, Ethical, and Technical Perspective (Hardcover)
Christos Kalloniatis, Carlos Travieso-Gonzalez
R3,351 Discovery Miles 33 510 Ships in 10 - 15 working days
Right Way to Select Technology - Get the Real Story on Finding the Best Fit (Paperback): Tony Byrne, Jarrod Gingras Right Way to Select Technology - Get the Real Story on Finding the Best Fit (Paperback)
Tony Byrne, Jarrod Gingras
R1,459 R720 Discovery Miles 7 200 Save R739 (51%) Ships in 12 - 17 working days
Teletraffic Technologies in ATM Networks (Hardcover): Hiroshi Saito Teletraffic Technologies in ATM Networks (Hardcover)
Hiroshi Saito
R3,234 Discovery Miles 32 340 Ships in 10 - 15 working days

This work surveys the various switching technologies, shows how to evaluate the performance of ATM networks and enables the reader to implement teletraffic control via connection admission control (CAC) and other traffic control methods. The text introduces the non-parametric approach for CAC and dimensioning and offers the hybrid CAC as an alternative solution to traffic control.

Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover): Luke Munn Countering the Cloud - Thinking With and Against Data Infrastructures (Hardcover)
Luke Munn
R1,406 Discovery Miles 14 060 Ships in 9 - 15 working days

How do cables and data centers think? This book investigates how information infrastructures enact particular forms of knowledge. It juxtaposes the pervasive logics of speed, efficiency, and resilience with more communal and ecological ways of thinking and being, turning technical "solutions" back into open questions about what society wants and what infrastructures should do. Moving from data centers in Hong Kong to undersea cables in Singapore and server clusters in China, Munn combines rich empirical material with insights drawn from media and cultural studies, sociology, and philosophy. This critical analysis stresses that infrastructures are not just technical but deeply epistemological, privileging some actions and actors while sidelining others. This innovative exploration of the values and visions at the heart of our technologies will interest students, scholars, and researchers in the areas of communication studies, digital media, technology studies, sociology, philosophy of technology, information studies, and geography.

Security Risk Management for the Internet of Things - Technologies and Techniques for IoT Security, Privacy and Data Protection... Security Risk Management for the Internet of Things - Technologies and Techniques for IoT Security, Privacy and Data Protection (Hardcover)
John Soldatos
R2,385 Discovery Miles 23 850 Ships in 10 - 15 working days

In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT systems. Risk assessments for modern IoT systems must be frequent, dynamic and driven by knowledge about both cyber and physical assets. Furthermore, they should be more proactive, more automated, and able to leverage information shared across IoT value chains. This book introduces a set of novel risk assessment techniques and their role in the IoT Security risk management process. Specifically, it presents architectures and platforms for end-to-end security, including their implementation based on the edge/fog computing paradigm. It also highlights machine learning techniques that boost the automation and proactiveness of IoT security risk assessments. Furthermore, blockchain solutions for open and transparent sharing of IoT security information across the supply chain are introduced. Frameworks for privacy awareness, along with technical measures that enable privacy risk assessment and boost GDPR compliance are also presented. Likewise, the book illustrates novel solutions for security certification of IoT systems, along with techniques for IoT security interoperability.In the coming years, IoT security will be a challenging, yet very exciting journey for IoT stakeholders, including security experts, consultants, security research organizations and IoT solution providers. The book provides knowledge and insights about where we stand on this journey. It also attempts to develop a vision for the future and to help readers start their IoT Security efforts on the right foot.

Streaming Media with Peer-to-Peer Networks - Wireless Perspectives (Hardcover, New): Martin Fleury, Nadia Qadri Streaming Media with Peer-to-Peer Networks - Wireless Perspectives (Hardcover, New)
Martin Fleury, Nadia Qadri
R5,179 Discovery Miles 51 790 Ships in 12 - 17 working days

The number of users who rely on the Internet to deliver multimedia content has grown significantly in recent years. As this consumer demand grows, so, too, does our dependency on a wireless and streaming infrastructure which delivers videos, podcasts, and other multimedia. Streaming Media with Peer-to-Peer Networks: Wireless Perspectives offers insights into current and future communication technologies for a converged Internet that promises soon to be dominated by multimedia applications, at least in terms of bandwidth consumption. The book will be of interest to industry managers, and will also serve as a valuable resource to students and researchers looking to grasp the dynamic issues surrounding video streaming and wireless network development.

A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd edition): Michael R Overly A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd edition)
Michael R Overly
R2,027 Discovery Miles 20 270 Ships in 9 - 15 working days

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.

SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover): Zhenbin Li, Zhibo Hu, Cheng Li SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover)
Zhenbin Li, Zhibo Hu, Cheng Li; Contributions by Chang-Qing Yang
R3,758 Discovery Miles 37 580 Ships in 12 - 17 working days

SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.

Big Data Analytics - Harnessing Data for New Business Models (Hardcover): Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi Big Data Analytics - Harnessing Data for New Business Models (Hardcover)
Soraya Sedkaoui, Mounia Khelfaoui, Nadjat Kadi
R4,033 Discovery Miles 40 330 Ships in 9 - 15 working days

This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business. It examines the role of analytics tools and methods of using big data in strengthening businesses to meet today's information challenges and shows how businesses can adapt big data for effective businesses practices. This volume shows how big data and the use of data analytics is being effectively adopted more frequently, especially in companies that are looking for new methods to develop smarter capabilities and tackle challenges in dynamic processes. Many illustrative case studies are presented that highlight how companies in every sector are now focusing on harnessing data to create a new way of doing business.

Collaborative Computer Security and Trust Management (Hardcover): Collaborative Computer Security and Trust Management (Hardcover)
R4,900 Discovery Miles 49 000 Ships in 12 - 17 working days

As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats. Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covering topics such as trust-based security, threat and risk analysis, and data sharing, this reference book provides a complete collection of the latest field developments.

Phonetics - The Science of Speech (Paperback): Martin J. Ball, Joan Rahilly Phonetics - The Science of Speech (Paperback)
Martin J. Ball, Joan Rahilly
R1,268 Discovery Miles 12 680 Ships in 12 - 17 working days

In their comprehensive new introduction to phonetics, Ball and Rahilly offer a detailed explanation of the process of speech production, from the anatomical initiation of sounds and their modification in the larynx, through to the final articulation of vowels and consonants in the oral and nasal tracts. This textbook is one of the few to give a balanced account of segmental and suprasegmental aspects of speech, showing clearly that the communication chain is incomplete without accurate production of both individual speech sounds (segmental features) and aspects such as stress and intonation (suprasegmental features). Throughout the book the authors provide advice on transcription, primarily using the International Phonetic Alphabet (IPA). Students are expertly guided from basic attempts to record speech sounds on paper, to more refined accounts of phonetic detail in speech. The authors go on to explain acoustic phonetics in a manner accessible both to new students in phonetics, and to those who wish to advance their knowledge of key pursuits in the area, including the sound spectrograph. They describe how speech waves can be measured, as well as considering how they are heard and decoded by listeners, discussing both physiological and neurological aspects of hearing and examining the methods of psychoacoustic experimentation. A range of instrumentation for studying speech production is also presented. The next link is acoustic phonetics, the study of speech transmission. Here the authors introduce the basic concepts of sound acoustics and the instrumentation used to analyse the characteristics of speech waves. Finally, the chain is completed by examining auditory phonetics, and providing a fascinating psychoacoustic experimentation, used to determine what parts of the speech signal are most crucial for listener understanding. The book concludes with a comprehensive survey and description of modern phonetic instrumentation, from the sound spectrograph to magnetic resonance imaging (MRI).

Threat Modeling - Designing for Security (Paperback): A Shostack Threat Modeling - Designing for Security (Paperback)
A Shostack
R1,511 Discovery Miles 15 110 Ships in 9 - 15 working days

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.

Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.

  • Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
  • Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
  • Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
  • Offers actionable how-to advice not tied to any specific software, operating system, or programming language
  • Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world

As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,669 R1,337 Discovery Miles 13 370
PCI Dss: A Pocket Guide
IT Governance Paperback R400 Discovery Miles 4 000
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,308 R1,219 Discovery Miles 12 190
Two-Factor Authentication
Mark Stanislav Paperback R516 Discovery Miles 5 160
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R4,995 R2,937 Discovery Miles 29 370
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,311 Discovery Miles 13 110
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R12,400 Discovery Miles 124 000
Guide to Networking Essentials
Greg Tomsho Paperback R1,339 R1,246 Discovery Miles 12 460
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,308 R1,219 Discovery Miles 12 190
Computer Networks, Global Edition
Andrew Tanenbaum, Nick Feamster, … Paperback R2,542 R2,378 Discovery Miles 23 780

 

Partners