0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (253)
  • R250 - R500 (866)
  • R500+ (13,679)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Amazon Kinesis Video Streams Developer Guide (Hardcover): Documentation Team Amazon Kinesis Video Streams Developer Guide (Hardcover)
Documentation Team
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days
Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017): Richard Jiang,... Biometric Security and Privacy - Opportunities & Challenges in The Big Data Era (Hardcover, 1st ed. 2017)
Richard Jiang, Somaya Al-Maadeed, Ahmed Bouridane, Prof. Danny Crookes, Azeddine Beghdadi
R4,834 Discovery Miles 48 340 Ships in 10 - 15 working days

This book highlights recent research advances on biometrics using new methods such as deep learning, nonlinear graph embedding, fuzzy approaches, and ensemble learning. Included are special biometric technologies related to privacy and security issues, such as cancellable biometrics and soft biometrics. The book also focuses on several emerging topics such as big data issues, internet of things, medical biometrics, healthcare, and robot-human interactions. The authors show how these new applications have triggered a number of new biometric approaches. They show, as an example, how fuzzy extractor has become a useful tool for key generation in biometric banking, and vein/heart rates from medical records can also be used to identify patients. The contributors cover the topics, their methods, and their applications in depth.

Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover): Ashwani Kumar, Seelam Sai Satyanarayana... Advancements in Security and Privacy Initiatives for Multimedia Images (Hardcover)
Ashwani Kumar, Seelam Sai Satyanarayana Reddy
R5,924 Discovery Miles 59 240 Ships in 18 - 22 working days

The use of digital images in today's modernized market is rapidly increasing throughout organizations due to the prevalence of social media and digital content. Companies who wish to distribute their content over the internet face numerous security risks such as copyright violation. Advanced methods for the protection and security of digital data are constantly emerging, and up-to-date research in this area is lacking. Advancements in Security and Privacy Initiatives for Multimedia Images is a collection of innovative research on the methods and applications of contemporary techniques for the security and copyright protection of images and their distribution. While highlighting topics including simulation-based security, digital watermarking protocols, and counterfeit prevention, this book is ideally designed for security analysts, researchers, developers, programmers, academicians, practitioners, students, executives, educators, and policymakers seeking current research on modern security improvements for multimedia images.

Security in IoT Social Networks (Paperback): Fadi Al-Turjman, B.D. Deebak Security in IoT Social Networks (Paperback)
Fadi Al-Turjman, B.D. Deebak
R2,634 Discovery Miles 26 340 Ships in 10 - 15 working days

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.

Amazon WorkMail User Guide (Hardcover): Documentation Team Amazon WorkMail User Guide (Hardcover)
Documentation Team
R885 Discovery Miles 8 850 Ships in 18 - 22 working days
Amazon CloudWatch Logs User Guide (Hardcover): Documentation Team Amazon CloudWatch Logs User Guide (Hardcover)
Documentation Team
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days
Model-Driven Development and Operation of Multi-Cloud Applications - The MODAClouds Approach (Hardcover): Dana Petcu, Peter... Model-Driven Development and Operation of Multi-Cloud Applications - The MODAClouds Approach (Hardcover)
Dana Petcu, Peter Matthews, Elisabetta Di Nitto
R1,284 Discovery Miles 12 840 Ships in 18 - 22 working days
Computer Science Security - Concepts and Tools (Hardcover): AS Zaidoun Computer Science Security - Concepts and Tools (Hardcover)
AS Zaidoun
R3,483 Discovery Miles 34 830 Ships in 18 - 22 working days

This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks, and encourages them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools to secure legacy software and hardware. Computing has infiltrated all fields nowadays. No one can escape this wave and be immune to security attacks, which continue to evolve, gradually reducing the level of expertise needed by hackers. It is high time for each and every user to acquire basic knowledge of computer security, which would enable them to mitigate the threats they may face both personally and professionally. It is this combined expertise of individuals and organizations that will guarantee a minimum level of security for families, schools, the workplace and society in general.

AWS Encryption SDK Developer Guide (Hardcover): Documentation Team AWS Encryption SDK Developer Guide (Hardcover)
Documentation Team
R898 Discovery Miles 8 980 Ships in 18 - 22 working days
Internet of Things (IoT) for Automated and Smart Applications (Hardcover): Yasser Ismail Internet of Things (IoT) for Automated and Smart Applications (Hardcover)
Yasser Ismail
R3,068 Discovery Miles 30 680 Ships in 18 - 22 working days
AWS Secrets Manager User Guide (Hardcover): Documentation Team AWS Secrets Manager User Guide (Hardcover)
Documentation Team
R1,158 Discovery Miles 11 580 Ships in 18 - 22 working days
AWS Direct Connect User Guide (Hardcover): Documentation Team AWS Direct Connect User Guide (Hardcover)
Documentation Team
R891 Discovery Miles 8 910 Ships in 18 - 22 working days
Edge Networking - Internet of Edges (Hardcover): K Agha Edge Networking - Internet of Edges (Hardcover)
K Agha
R3,522 Discovery Miles 35 220 Ships in 18 - 22 working days

The Internet of Edges is a new paradigm whose objective is to keep data and processing close to the user. This book presents three different levels of Edge networking: MEC (Multi-access Edge Computing), Fog and Far Edge (sometimes called Mist or Skin). It also reviews participatory networks, in which user equipment provides the resources for the Edge network. Edge networks can be disconnected from the core Internet, and the interconnection of autonomous edge networks can then form the Internet of Edges. This book analyzes the characteristics of Edge networks in detail, showing their capacity to replace the imposing Clouds of core networks due to their superior server response time, data security and energy saving.

Multisensory Experiences - Where the senses meet technology (Hardcover): Carlos Velasco, Marianna Obrist Multisensory Experiences - Where the senses meet technology (Hardcover)
Carlos Velasco, Marianna Obrist
R1,169 Discovery Miles 11 690 Ships in 10 - 15 working days

Most of our everyday life experiences are multisensory in nature; that is, they consist of what we see, hear, feel, taste, smell, and much more. Almost any experience you can think of, such as eating a meal or going to the cinema, involves a magnificent sensory world. In recent years, many of these experiences have been increasingly transformed and capitalised on through advancements that adapt the world around us - through technology, products, and services - to suit our ever more computerised environment. Multisensory Experiences: Where the senses meet technology looks at this trend and offers a comprehensive introduction to the dynamic world of multisensory experiences and design. It takes the reader from the fundamentals of multisensory experiences, through the relationship between the senses and technology, to finally what the future of those experiences may look like, and our responsibility in it. This book empowers you to shape your own and other people's experiences by considering the multisensory worlds that we live in through a journey that marries science and practice. It also shows how we can take advantage of the senses and how they shape our experiences through intelligent technological design.

Amazon Sumerian User Guide (Hardcover): Documentation Team Amazon Sumerian User Guide (Hardcover)
Documentation Team
R1,140 Discovery Miles 11 400 Ships in 18 - 22 working days
Digital Health - Mobile and Wearable Devices for Participatory Health Applications (Paperback): Shabbir Syed-Abdul, Xinxin Zhu,... Digital Health - Mobile and Wearable Devices for Participatory Health Applications (Paperback)
Shabbir Syed-Abdul, Xinxin Zhu, Luis Fernandez-Luque
R2,525 Discovery Miles 25 250 Ships in 10 - 15 working days

Digital Health: Mobile and Wearable Devices for Participatory Health Applications is a key reference for engineering and clinical professionals considering the development or implementation of mobile and wearable solutions in the healthcare domain. The book presents a comprehensive overview of devices and appropriateness for the respective applications. It also explores the ethical, privacy, and cybersecurity aspects inherent in networked and mobile technologies. It offers expert perspectives on various approaches to the implementation and integration of these devices and applications across all areas of healthcare. The book is designed with a multidisciplinary audience in mind; from software developers and biomedical engineers who are designing these devices to clinical professionals working with patients and engineers on device testing, human factors design, and user engagement/compliance.

AWS X-Ray Developer Guide (Hardcover): Development Team AWS X-Ray Developer Guide (Hardcover)
Development Team
R1,190 Discovery Miles 11 900 Ships in 18 - 22 working days
5G NR - The Next Generation Wireless Access Technology (Paperback, 2nd edition): Erik Dahlman, Stefan Parkvall, Johan Skold 5G NR - The Next Generation Wireless Access Technology (Paperback, 2nd edition)
Erik Dahlman, Stefan Parkvall, Johan Skold
R2,062 Discovery Miles 20 620 Ships in 10 - 15 working days

5G NR: The Next Generation Wireless Access Technology, Second Edition, follows the authors' highly celebrated books on 3G and 4G and provides a new level of insight into 5G NR. After background discussion of 5G, including requirements, spectrum aspects, and the standardization timeline, all technology features of the first phase of NR are described in detail. The book covers the NR physical-layer structure and higher-layer protocols, RF and spectrum aspects, and co-existence and interworking with LTE. The book provides a good foundation in NR and different NR technology components, giving insight into why a certain solution has been selected. This second edition is updated to reflect the latest developments in Release 16 and includes brand new chapters on: NR in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in Rel-16; industrial IoT; IIoT and referring to the URLLC enhancements for PDCCH; RIM/CL; and positioning. Also included are the key radio-related requirements of NR; design principles; technical features of basic NR transmission structure-showing where it was inherited from LTE, where it deviates from it, and the reasons why- NR multi-antenna transmission functionality; detailed description of the signals and functionality of the initial NR access, including signals for synchronization and system information; random access and paging; LTE/NR co-existence in the same spectrum and the benefits of their interworking as one system; and different aspects of mobility in NR. RF requirements for NR are described for BS and UE, the legacy bands, and for the new mm-wave bands.

AWS Marketplace User Guide (Hardcover): Documentation Team AWS Marketplace User Guide (Hardcover)
Documentation Team
R1,134 Discovery Miles 11 340 Ships in 18 - 22 working days
Randomly Deployed Wireless Sensor Networks (Paperback): XI Chen Randomly Deployed Wireless Sensor Networks (Paperback)
XI Chen
R3,004 Discovery Miles 30 040 Ships in 10 - 15 working days

Wireless sensor networks have a range of applications, including military uses and in environmental monitoring. When an area of interest is inaccessible by conventional means, such a network can be deployed in ways resulting in a random distribution of the sensors. Randomly Deployed Wireless Sensor Networks offers a probabilistic method to model and analyze these networks. The book considers the network design, coverage, target detection, localization and tracking of sensors in randomly deployed wireless networks, and proposes a stochastic model. It quantifies the relationship between parameters of the network and its performance, and puts forward a communication protocol. The title provides analyses and formulas, giving engineering insight into randomly deployed wireless sensor networks. Five chapters consider the analysis of coverage performance; working modes and scheduling mechanisms; the relationship between sensor behavior and network performance properties; probabilistic forwarding routing protocols; localization methods for multiple targets and target number estimation; and experiments on target localization and tracking with a Mica sensor system.

Investigations and the Art of the Interview (Paperback, 4th edition): Inge Sebyan Black, Lawrence Fennelly Investigations and the Art of the Interview (Paperback, 4th edition)
Inge Sebyan Black, Lawrence Fennelly
R1,661 Discovery Miles 16 610 Ships in 10 - 15 working days

The Art of Investigative Interviewing, Fourth Edition, builds on the successes of the previous editions providing the reader guidance on conducting investigative interviews, both ethically and professionally. The book can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. The reader learns key elements of investigative interviewing, such as human psychology, proper interview preparation, tactical concepts, controlling the interview environment, and evaluating the evidence obtained from the interview. New to this edition will be coverage of Open Source Intelligence (OSINT) tools, workplace investigations, fraud investigations and the role of audit. Larry Fennelly joins original author Inge Sebyan Black, both well-known and respected in the field, providing everything an interviewer needs to know in order to conduct successful interviews with integrity and within the law. Written for anyone involved in investigative interviewing.

Amazon Inspector User Guide (Hardcover): Documentation Team Amazon Inspector User Guide (Hardcover)
Documentation Team
R886 Discovery Miles 8 860 Ships in 18 - 22 working days
Managing Resources for Futuristic Wireless Networks (Hardcover): Tariq Umer Managing Resources for Futuristic Wireless Networks (Hardcover)
Tariq Umer
R5,327 Discovery Miles 53 270 Ships in 18 - 22 working days

The key parameter that needs to be considered when planning the management of resources in futuristic wireless networks is a balanced approach to resource distribution. A balanced approach is necessary to provide an unbiased working environment for the distribution, sharing, allocation, and supply of resources among the devices of the wireless network. Equal resource distribution also maintains balance and stability between the operations of communication systems and thus improves the performance of wireless networks. Managing Resources for Futuristic Wireless Networks is a pivotal reference source that presents research related to the control and management of key parameters of bandwidth, spectrum sensing, channel selection, resource sharing, and task scheduling, which is necessary to ensure the efficient operation of wireless networks. Featuring topics that include vehicular ad-hoc networks, resource management, and the internet of things, this publication is ideal for professionals and researchers working in the field of networking, information and knowledge management, and communication sciences. Moreover, the book will provide insights and support executives concerned with the management of expertise, knowledge, information, and organizational development in different types of work communities and environments.

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security... Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls (Paperback)
Tom Piens
R1,181 Discovery Miles 11 810 Ships in 18 - 22 working days

Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishing Key Features Learn the ins and outs of log forwarding and troubleshooting issues Set up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LSVPN issues Gain an in-depth understanding of user credential detection to prevent data leaks Book DescriptionThis book builds on the content found in Mastering Palo Alto Networks, focusing on the different methods of establishing remote connectivity, automating log actions, and protecting against phishing attacks through user credential detection. Complete with step-by-step instructions, practical examples, and troubleshooting tips, you will gain a solid understanding of how to configure and deploy Palo Alto Networks remote access products. As you advance, you will learn how to design, deploy, and troubleshoot large-scale end-to-end user VPNs. Later, you will explore new features and discover how to incorporate them into your environment. By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection. What you will learn Understand how log forwarding is configured on the firewall Focus on effectively enabling remote access Explore alternative ways for connecting users and remote networks Protect against phishing with credential detection Understand how to troubleshoot complex issues confidently Strengthen the security posture of your firewalls Who this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. Basic knowledge of Palo Alto Networks, network protocols, and network design will be helpful, which is why reading Mastering Palo Alto Networks is recommended first to help you make the most of this book.

Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition): Olof Liberg,... Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition)
Olof Liberg, Marten Sundberg, Eric Wang, Johan Bergman, Joachim Sachs, …
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

Cellular Internet of Things: From Massive Deployments to Critical 5G Applications, Second Edition, gives insights into the recent and rapid work performed by the 3rd Generation Partnership Project (3GPP) and the Multefire Alliance (MFA) to develop systems for the Cellular IoT. Beyond the technologies, readers will learn what the mMTC and cMTC market segments look like, deployment options and expected performance in terms of system capacity, expected battery lifetime, data throughput, access delay time and device cost, regulations for operation in unlicensed frequency bands, and how they impact system design and performance. This new edition contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT features in 3GPP Release 15, critical communication, i.e. URLLC, specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT for unlicensed frequency bands specified in the Multefire Alliance (MFA), and an updated outlook of what the future holds in Industrial IoT and drone communications, amongst other topics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Thinkwork - Working, Learning, and…
Fred Young Phillips Hardcover R2,809 R2,543 Discovery Miles 25 430
SceneWriting - The Missing Manual for…
Chris Perry, Eric Henry Sanders Hardcover R2,368 Discovery Miles 23 680
Poppy Ajudha/Skinny Pelembe - Watermelon…
Poppy Ajudha, Skinny Pelembe Vinyl record R250 R208 Discovery Miles 2 080
Writing the Comedy Pilot Script - A…
Manny Basanese Hardcover R4,483 Discovery Miles 44 830
Just One Of Those Things
Nat King Cole Vinyl record R398 R378 Discovery Miles 3 780
At Water's Edge - The Birds of Florida
Bansemer Roger Hardcover R1,357 Discovery Miles 13 570
From Craftsmen to Capitalists - German…
Frederick L. McKitrick Hardcover R2,849 Discovery Miles 28 490
The Birds of Australia; v.3 (1848)
John 1804-1881 Gould Hardcover R981 Discovery Miles 9 810
Ougat - From A Hoe Into A Housewife, And…
Shana Fife Paperback  (5)
R562 Discovery Miles 5 620
Developments in Software Product Line
Chester Mann Hardcover R1,517 Discovery Miles 15 170

 

Partners