0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (271)
  • R250 - R500 (872)
  • R500+ (13,586)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Architecture and Security Issues in Fog Computing Applications (Hardcover): Sam Goundar, S. Bharath Bhushan, Praveen Kumar... Architecture and Security Issues in Fog Computing Applications (Hardcover)
Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani
R5,924 Discovery Miles 59 240 Ships in 18 - 22 working days

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover): Pradeep Tomar Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover)
Pradeep Tomar
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based IoT systems. Integration and Implementation of the Internet of Things Through Cloud Computing studies, analyzes, and presents cloud-based IoT-related technologies, protocols, and standards along with recent research and development in cloud-based IoT. It also presents recent emerging trends and technological advances of cloud-based IoT, innovative applications, and the challenges and implications for society. The chapters included take a strong look at the societal and social aspects of this technology along with its implementations and technological analyses. This book is intended for IT specialists, technologists, practitioners, researchers, academicians, and students who are interested in the next era of IoT through cloud computing.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R8,949 Discovery Miles 89 490 Ships in 18 - 22 working days
Securing Delay-Tolerant Networks with BPSec (Hardcover): Birrane Securing Delay-Tolerant Networks with BPSec (Hardcover)
Birrane
R3,133 Discovery Miles 31 330 Ships in 18 - 22 working days

Securing Delay-Tolerant Networks with BPSec One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders Securing Delay-Tolerant Networks with BPSec answers the question, "How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?" The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments. The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included. Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches. Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks (DTNs) with BPSec includes information on: The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls Securing the terrestrial internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security, including software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.

Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic (Hardcover): Ryma Abassi, Aida Ben Chehida Douss Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic (Hardcover)
Ryma Abassi, Aida Ben Chehida Douss
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

The COVID-19 pandemic has forced organizations and individuals to embrace new practices such as social distancing and remote working. During these unprecedented times, many have increasingly relied on the internet for work, shopping, and healthcare. However, while the world focuses on the health and economic threats posed by the COVID-19 pandemic, cyber criminals are capitalizing on this crisis as the world has become more digitally dependent and vulnerable than ever. Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic provides cutting-edge research on the best guidelines for preventing, detecting, and responding to cyber threats within educational, business, health, and governmental organizations during the COVID-19 pandemic. It further highlights the importance of focusing on cybersecurity within organizational crisis management. Covering topics such as privacy and healthcare, remote work, and personal health data, this premier reference source is an indispensable resource for startup companies, health and business executives, ICT procurement managers, IT professionals, libraries, students and educators of higher education, entrepreneurs, government officials, social media experts, researchers, and academicians.

Applying Integration Techniques and Methods in Distributed Systems (Hardcover): Gabor Kecskemeti Applying Integration Techniques and Methods in Distributed Systems (Hardcover)
Gabor Kecskemeti
R6,050 Discovery Miles 60 500 Ships in 18 - 22 working days

Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians.

Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,097 Discovery Miles 10 970 Ships in 18 - 22 working days
Cloud Computing Applications and Techniques for E-Commerce (Hardcover): Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy Cloud Computing Applications and Techniques for E-Commerce (Hardcover)
Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Many professional fields have been affected by the rapid growth of technology and information. Included in this are the business and management markets as the implementation of e-commerce and cloud computing have caused enterprises to make considerable changes to their practices. With the swift advancement of this technology, professionals need proper research that provides solutions to the various issues that come with data integration and shifting to a technology-driven environment. Cloud Computing Applications and Techniques for E-Commerce is an essential reference source that discusses the implementation of data and cloud technology within the fields of business and information management. Featuring research on topics such as content delivery networks, virtualization, and software resources, this book is ideally designed for managers, educators, administrators, researchers, computer scientists, business practitioners, economists, information analysists, sociologists, and students seeking coverage on the recent advancements of e-commerce using cloud computing techniques.

Cybersecurity 2021 (Hardcover): Carl Freeman Cybersecurity 2021 (Hardcover)
Carl Freeman
R1,039 R877 Discovery Miles 8 770 Save R162 (16%) Ships in 18 - 22 working days
Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R8,027 Discovery Miles 80 270 Ships in 18 - 22 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R8,951 Discovery Miles 89 510 Ships in 18 - 22 working days
Deep Learning through Sparse and Low-Rank Modeling (Paperback): Zhangyang Wang, Yun Fu, Thomas S. Huang Deep Learning through Sparse and Low-Rank Modeling (Paperback)
Zhangyang Wang, Yun Fu, Thomas S. Huang
R2,065 Discovery Miles 20 650 Ships in 10 - 15 working days

Deep Learning through Sparse Representation and Low-Rank Modeling bridges classical sparse and low rank models-those that emphasize problem-specific Interpretability-with recent deep network models that have enabled a larger learning capacity and better utilization of Big Data. It shows how the toolkit of deep learning is closely tied with the sparse/low rank methods and algorithms, providing a rich variety of theoretical and analytic tools to guide the design and interpretation of deep learning models. The development of the theory and models is supported by a wide variety of applications in computer vision, machine learning, signal processing, and data mining. This book will be highly useful for researchers, graduate students and practitioners working in the fields of computer vision, machine learning, signal processing, optimization and statistics.

Cloud Computing: Systems and Technologies (Hardcover): Amanda Wegener Cloud Computing: Systems and Technologies (Hardcover)
Amanda Wegener
R3,218 R2,913 Discovery Miles 29 130 Save R305 (9%) Ships in 18 - 22 working days
Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,416 Discovery Miles 94 160 Ships in 18 - 22 working days
Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the... Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering (Hardcover)
Quinn Kiser
R667 R596 Discovery Miles 5 960 Save R71 (11%) Ships in 18 - 22 working days
Heterogeneous Computing - Hardware and Software Perspectives (Hardcover): Mohamed Zahran Heterogeneous Computing - Hardware and Software Perspectives (Hardcover)
Mohamed Zahran
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

If you look around you will find that all computer systems, from your portable devices to the strongest supercomputers, are heterogeneous in nature. The most obvious heterogeneity is the existence of computing nodes of different capabilities (e.g. multicore, GPUs, FPGAs, ...). But there are also other heterogeneity factors that exist in computing systems, like the memory system components, interconnection, etc. The main reason for these different types of heterogeneity is to have good performance with power efficiency. Heterogeneous computing results in both challenges and opportunities. This book discusses both. It shows that we need to deal with these challenges at all levels of the computing stack: from algorithms all the way to process technology. We discuss the topic of heterogeneous computing from different angles: hardware challenges, current hardware state-of-the-art, software issues, how to make the best use of the current heterogeneous systems, and what lies ahead. The aim of this book is to introduce the big picture of heterogeneous computing. Whether you are a hardware designer or a software developer, you need to know how the pieces of the puzzle fit together. The main goal is to bring researchers and engineers to the forefront of the research frontier in the new era that started a few years ago and is expected to continue for decades. We believe that academics, researchers, practitioners, and students will benefit from this book and will be prepared to tackle the big wave of heterogeneous computing that is here to stay.

A Hacker, I Am (Hardcover): Craig Ford A Hacker, I Am (Hardcover)
Craig Ford
R892 R771 Discovery Miles 7 710 Save R121 (14%) Ships in 18 - 22 working days
iTECH-NICALLY SAID THAT (Hardcover): Kimber Woods iTECH-NICALLY SAID THAT (Hardcover)
Kimber Woods
R1,020 Discovery Miles 10 200 Ships in 10 - 15 working days
Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations (Hardcover): Ana Pego Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations (Hardcover)
Ana Pego
R7,723 Discovery Miles 77 230 Ships in 18 - 22 working days

Businesses have had to face many challenges due to the COVID-19 pandemic; to survive in the changing landscape, they had to adapt quickly and implement new tactics and best practices to stay competitive. Networking is one of the many areas that looks vastly different in a post-pandemic world and companies must understand this change or risk falling behind. Further study is required to uncover the various difficulties and potential future directions of networking and innovation within the business landscape. The Handbook of Research on Digital Innovation and Networking in Post-COVID-19 Organizations provides a thorough overview of the ways in which organizations have had to change and adapt to the new business environments and considers how networking looks different in a post-COVID-19 world. Covering key topics such as organizational structures, consumer behavior, teleworking, and collaborations, this major reference work is ideal for managers, business owners, industry professionals, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.

Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications (Paperback): Arun Kumar Sangaiah,... Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications (Paperback)
Arun Kumar Sangaiah, Zhiyong Z,Zhang, Michael Sheng
R3,164 R2,964 Discovery Miles 29 640 Save R200 (6%) Ships in 10 - 15 working days

Computational Intelligence for Multimedia Big Data on the Cloud with Engineering Applications covers timely topics, including the neural network (NN), particle swarm optimization (PSO), evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS), etc. Furthermore, the book highlights recent research on representative techniques to elaborate how a data-centric system formed a powerful platform for the processing of cloud hosted multimedia big data and how it could be analyzed, processed and characterized by CI. The book also provides a view on how techniques in CI can offer solutions in modeling, relationship pattern recognition, clustering and other problems in bioengineering. It is written for domain experts and developers who want to understand and explore the application of computational intelligence aspects (opportunities and challenges) for design and development of a data-centric system in the context of multimedia cloud, big data era and its related applications, such as smarter healthcare, homeland security, traffic control trading analysis and telecom, etc. Researchers and PhD students exploring the significance of data centric systems in the next paradigm of computing will find this book extremely useful.

Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous... Security of Networks and Services in an All-Connected World - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings (Hardcover)
Daphne Tuncer, Robert Koch, Remi Badonnel
R1,344 Discovery Miles 13 440 Ships in 18 - 22 working days
Security in Computer and Information Sciences (Hardcover): Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios Security in Computer and Information Sciences (Hardcover)
Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios
R1,290 Discovery Miles 12 900 Ships in 18 - 22 working days
Your Safety and Privacy Online - The CIA and NSA (Hardcover): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Hardcover)
Siggi Bjarnason
R520 R489 Discovery Miles 4 890 Save R31 (6%) Ships in 18 - 22 working days
Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover): Ricardo Queiros, Bruno Cunha,... Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover)
Ricardo Queiros, Bruno Cunha, Xavier Fonseca
R11,656 Discovery Miles 116 560 Ships in 18 - 22 working days

Digital technologies are currently dramatically changing healthcare. Cloud healthcare is an increasingly trending topic in the field, converging skills from computer and health science. This new strategy fosters the management of health data at a large scale and makes it easier for healthcare organizations to improve patient experience and health team productivity while helping the support, security, compliance, and interoperability of health data. Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare is a reference in the ongoing digital transformation of the healthcare sector. It presents a comprehensive state-of-the-art approach to cloud internet of things health technologies and practices. It provides insights over strategies, methodologies, techniques, tools, and services based on emerging cloud digital health solutions to overcome digital health challenges. Covering topics such as auxiliary systems, the internet of medical things, and natural language processing, this premier reference source is an essential resource for medical professionals, hospital administrators, medical students, medical professors, libraries, researchers, and academicians.

Real-Time and Retrospective Analyses of Cyber Security (Hardcover): David Anthony Bird Real-Time and Retrospective Analyses of Cyber Security (Hardcover)
David Anthony Bird
R5,324 Discovery Miles 53 240 Ships in 18 - 22 working days

Society is continually transforming into a digitally powered reality due to the increased dependence of computing technologies. The landscape of cyber threats is constantly evolving because of this, as hackers are finding improved methods of accessing essential data. Analyzing the historical evolution of cyberattacks can assist practitioners in predicting what future threats could be on the horizon. Real-Time and Retrospective Analyses of Cyber Security is a pivotal reference source that provides vital research on studying the development of cybersecurity practices through historical and sociological analyses. While highlighting topics such as zero trust networks, geopolitical analysis, and cyber warfare, this publication explores the evolution of cyber threats, as well as improving security methods and their socio-technological impact. This book is ideally designed for researchers, policymakers, strategists, officials, developers, educators, sociologists, and students seeking current research on the evolution of cybersecurity methods through historical analysis and future trends.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Network+ Guide to Networks
Jill West Paperback R1,416 R1,315 Discovery Miles 13 150
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, … Paperback R1,452 Discovery Miles 14 520
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, … Paperback R1,452 Discovery Miles 14 520
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,389 R1,288 Discovery Miles 12 880
Blockchain Technology in Corporate…
K Sood Hardcover R4,308 Discovery Miles 43 080
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300

 

Partners