0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (277)
  • R250 - R500 (884)
  • R500+ (13,597)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Computing in Communication Networks - From Theory to Practice (Paperback): Frank H. P. Fitzek, Fabrizio Granelli, Patrick... Computing in Communication Networks - From Theory to Practice (Paperback)
Frank H. P. Fitzek, Fabrizio Granelli, Patrick Seeling
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

Computing in Communication Networks: From Theory to Practice provides comprehensive details and practical implementation tactics on the novel concepts and enabling technologies at the core of the paradigm shift from store and forward (dumb) to compute and forward (intelligent) in future communication networks and systems. The book explains how to create virtualized large scale testbeds using well-established open source software, such as Mininet and Docker. It shows how and where to place disruptive techniques, such as machine learning, compressed sensing, or network coding in a newly built testbed. In addition, it presents a comprehensive overview of current standardization activities. Specific chapters explore upcoming communication networks that support verticals in transportation, industry, construction, agriculture, health care and energy grids, underlying concepts, such as network slicing and mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN, disruptive innovations, such as network coding, compressed sensing and machine learning, how to build a virtualized network infrastructure testbed on one's own computer, and more.

Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover): Pradeep Tomar Integration and Implementation of the Internet of Things Through Cloud Computing (Hardcover)
Pradeep Tomar
R6,648 Discovery Miles 66 480 Ships in 18 - 22 working days

The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based IoT systems. Integration and Implementation of the Internet of Things Through Cloud Computing studies, analyzes, and presents cloud-based IoT-related technologies, protocols, and standards along with recent research and development in cloud-based IoT. It also presents recent emerging trends and technological advances of cloud-based IoT, innovative applications, and the challenges and implications for society. The chapters included take a strong look at the societal and social aspects of this technology along with its implementations and technological analyses. This book is intended for IT specialists, technologists, practitioners, researchers, academicians, and students who are interested in the next era of IoT through cloud computing.

Internet of Things (IoT) for Automated and Smart Applications (Hardcover): Yasser Ismail Internet of Things (IoT) for Automated and Smart Applications (Hardcover)
Yasser Ismail
R3,068 Discovery Miles 30 680 Ships in 18 - 22 working days
Wearable Devices - the Big Wave of Innovation (Hardcover): Noushin Nasiri Wearable Devices - the Big Wave of Innovation (Hardcover)
Noushin Nasiri
R3,065 Discovery Miles 30 650 Ships in 18 - 22 working days
Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition): Olof Liberg,... Cellular Internet of Things - From Massive Deployments to Critical 5G Applications (Paperback, 2nd edition)
Olof Liberg, Marten Sundberg, Eric Wang, Johan Bergman, Joachim Sachs, …
R2,403 Discovery Miles 24 030 Ships in 10 - 15 working days

Cellular Internet of Things: From Massive Deployments to Critical 5G Applications, Second Edition, gives insights into the recent and rapid work performed by the 3rd Generation Partnership Project (3GPP) and the Multefire Alliance (MFA) to develop systems for the Cellular IoT. Beyond the technologies, readers will learn what the mMTC and cMTC market segments look like, deployment options and expected performance in terms of system capacity, expected battery lifetime, data throughput, access delay time and device cost, regulations for operation in unlicensed frequency bands, and how they impact system design and performance. This new edition contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT features in 3GPP Release 15, critical communication, i.e. URLLC, specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT for unlicensed frequency bands specified in the Multefire Alliance (MFA), and an updated outlook of what the future holds in Industrial IoT and drone communications, amongst other topics.

Air Route Networks Through Complex Networks Theory (Paperback): Jose M Sallan, Oriol Lordan Air Route Networks Through Complex Networks Theory (Paperback)
Jose M Sallan, Oriol Lordan
R2,519 Discovery Miles 25 190 Ships in 10 - 15 working days

Air Route Networks through Complex Networks Theory connects theory research with network connectivity analysis, providing practitioners with the tools they need to develop more efficient, resilient and profitable air route networks. The book helps airline route planners and executives create more robust route networks that are less vulnerable to disruptions, such as node isolation. The book further explores errors and attacks in complex networks, strategies for detecting critical nodes and cascading failure models to assess and maximize robustness. The book explains how to measure air route network connectivity with complex network representations. Air transport is among the most dynamic and toughest competition industries in today's global economy. The quality of air route network design is a key strategic factor in an airline's viability. These robust networks provide for more stable and secure carrier operations vs. those based simply on existing supply and demand volumes. Node-specific and network-specific representations are covered, along with in-depth coverage of connectivity in special and temporal networks. These collective tools serve as a guide for practitioners seeking to apply complex network theory to the airline industry.

Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover): Ahmed J. Obaid,... Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications (Hardcover)
Ahmed J. Obaid, Ghassan H Abdul-Majeed, Adriana Burlea-Schiopoiu, Parul Aggarwal
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

In recent years, falsification and digital modification of video clips, images, as well as textual contents have become widespread and numerous, especially when deepfake technologies are adopted in many sources. Due to adopted deepfake techniques, a lot of content currently cannot be recognized from its original sources. As a result, the field of study previously devoted to general multimedia forensics has been revived. The Handbook of Research on Advanced Practical Approaches to Deepfake Detection and Applications discusses the recent techniques and applications of illustration, generation, and detection of deepfake content in multimedia. It introduces the techniques and gives an overview of deepfake applications, types of deepfakes, the algorithms and applications used in deepfakes, recent challenges and problems, and practical applications to identify, generate, and detect deepfakes. Covering topics such as anomaly detection, intrusion detection, and security enhancement, this major reference work is a comprehensive resource for cyber security specialists, government officials, law enforcement, business leaders, students and faculty of higher education, librarians, researchers, and academicians.

Strategic Approaches to Digital Platform Security Assurance (Hardcover): Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves... Strategic Approaches to Digital Platform Security Assurance (Hardcover)
Yuri Bobbert, Maria Chtepen, Tapan Kumar, Yves Vanderbeken, Dennis Verslegers
R5,333 Discovery Miles 53 330 Ships in 18 - 22 working days

Nowadays it is impossible to imagine a business without technology as most industries are becoming ""smarter"" and more tech-driven, ranging from small individual tech initiatives to complete business models with intertwined supply chains and ""platform""-based business models. New ways of working, such as agile and DevOps, have been introduced, leading to new risks. These risks come in the form of new challenges for teams working together in a distributed manner, privacy concerns, human autonomy, and cybersecurity concerns. Technology is now integrated into the business discipline and is here to stay leading to the need for a thorough understanding of how to address these risks and all the potential problems that could arise. With the advent of organized crime, such as hacks and denial-of-service attacks, all kinds of malicious actors are infiltrating the digital society in new and unique ways. Systems with poor design, implementation, and configurations are easily taken advantage of. When it comes to integrating business and technology, there needs to be approaches for assuring security against risks that can threaten both businesses and their digital platforms. Strategic Approaches to Digital Platform Security Assurance offers comprehensive design science research approaches to extensively examine risks in digital platforms and offer pragmatic solutions to these concerns and challenges. This book addresses significant problems when transforming an organization embracing API-based platform models, the use of DevOps teams, and issues in technological architectures. Each section will examine the status quo for business technologies, the current challenges, and core success factors and approaches that have been used. This book is ideal for security analysts, software engineers, computer engineers, executives, managers, IT consultants, business professionals, researchers, academicians, and students who want to gain insight and deeper knowledge of security in digital platforms and gain insight into the most important success factors and approaches utilized by businesses.

Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover): Ricardo Queiros, Bruno Cunha,... Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare (Hardcover)
Ricardo Queiros, Bruno Cunha, Xavier Fonseca
R10,580 Discovery Miles 105 800 Ships in 18 - 22 working days

Digital technologies are currently dramatically changing healthcare. Cloud healthcare is an increasingly trending topic in the field, converging skills from computer and health science. This new strategy fosters the management of health data at a large scale and makes it easier for healthcare organizations to improve patient experience and health team productivity while helping the support, security, compliance, and interoperability of health data. Exploring the Convergence of Computer and Medical Science Through Cloud Healthcare is a reference in the ongoing digital transformation of the healthcare sector. It presents a comprehensive state-of-the-art approach to cloud internet of things health technologies and practices. It provides insights over strategies, methodologies, techniques, tools, and services based on emerging cloud digital health solutions to overcome digital health challenges. Covering topics such as auxiliary systems, the internet of medical things, and natural language processing, this premier reference source is an essential resource for medical professionals, hospital administrators, medical students, medical professors, libraries, researchers, and academicians.

Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Information Reso Management Association
R8,951 Discovery Miles 89 510 Ships in 18 - 22 working days
Architecture and Security Issues in Fog Computing Applications (Hardcover): Sam Goundar, S. Bharath Bhushan, Praveen Kumar... Architecture and Security Issues in Fog Computing Applications (Hardcover)
Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani
R5,924 Discovery Miles 59 240 Ships in 18 - 22 working days

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

What's My Password? - An Easy Password Tracker for 700 Websites. - Discrete size (5.5x8.5 in). 50 pages for up to 700 user... What's My Password? - An Easy Password Tracker for 700 Websites. - Discrete size (5.5x8.5 in). 50 pages for up to 700 user names and passwords. White paper. (Paperback)
Protect Your Privacy Press
R197 Discovery Miles 1 970 Ships in 18 - 22 working days
Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R8,949 Discovery Miles 89 490 Ships in 18 - 22 working days
Securing Delay-Tolerant Networks with BPSec (Hardcover): Birrane Securing Delay-Tolerant Networks with BPSec (Hardcover)
Birrane
R3,133 Discovery Miles 31 330 Ships in 18 - 22 working days

Securing Delay-Tolerant Networks with BPSec One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders Securing Delay-Tolerant Networks with BPSec answers the question, "How can delay-tolerant networks be secured when operating in environments that would otherwise break many of the common security approaches used on the terrestrial Internet today?" The text is composed of three sections: (1) security considerations for delay-tolerant networks, (2) the design, implementation, and customization of the BPSec protocol, and (3) how this protocol can be applied, combined with other security protocols, and deployed in emerging network environments. The text includes pragmatic considerations for deploying BPSec in both regular and delay-tolerant networks. It also features a tutorial on how to achieve several important security outcomes with a combination of security protocols, BPSec included. Overall, it covers best practices for common security functions, clearly showing designers how to prevent network architecture from being over-constrained by traditional security approaches. Written by the lead author and originator of the BPSec protocol specification, Securing Delay-Tolerant Networks (DTNs) with BPSec includes information on: The gap between cryptography and network security, how security requirements constrain network architectures, and why we need something different DTN stressing conditions, covering intermittent connectivity, congested paths, partitioned topologies, limited link state, and multiple administrative controls Securing the terrestrial internet, involving a layered approach to security, the impact of protocol design on security services, and securing the internetworking and transport layers A delay-tolerant security architecture, including desirable properties of a DTN secure protocol, fine-grained security services, and protocol augmentation Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop reference on the subject for any professional operationally deploying BP who must use BPSec for its security, including software technical leads, software developers, space flight mission leaders, network operators, and technology and product development leaders in general.

Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover): Amit Kumar Tyagi Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World (Hardcover)
Amit Kumar Tyagi
R8,044 Discovery Miles 80 440 Ships in 18 - 22 working days

More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.

Cybersecurity 2021 (Hardcover): Carl Freeman Cybersecurity 2021 (Hardcover)
Carl Freeman
R1,039 R877 Discovery Miles 8 770 Save R162 (16%) Ships in 18 - 22 working days
Cloud Computing Applications and Techniques for E-Commerce (Hardcover): Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy Cloud Computing Applications and Techniques for E-Commerce (Hardcover)
Saikat Gochhait, David Tawei Shou, Sabiha Fazalbhoy
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

Many professional fields have been affected by the rapid growth of technology and information. Included in this are the business and management markets as the implementation of e-commerce and cloud computing have caused enterprises to make considerable changes to their practices. With the swift advancement of this technology, professionals need proper research that provides solutions to the various issues that come with data integration and shifting to a technology-driven environment. Cloud Computing Applications and Techniques for E-Commerce is an essential reference source that discusses the implementation of data and cloud technology within the fields of business and information management. Featuring research on topics such as content delivery networks, virtualization, and software resources, this book is ideally designed for managers, educators, administrators, researchers, computer scientists, business practitioners, economists, information analysists, sociologists, and students seeking coverage on the recent advancements of e-commerce using cloud computing techniques.

Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic (Hardcover): Ryma Abassi, Aida Ben Chehida Douss Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic (Hardcover)
Ryma Abassi, Aida Ben Chehida Douss
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

The COVID-19 pandemic has forced organizations and individuals to embrace new practices such as social distancing and remote working. During these unprecedented times, many have increasingly relied on the internet for work, shopping, and healthcare. However, while the world focuses on the health and economic threats posed by the COVID-19 pandemic, cyber criminals are capitalizing on this crisis as the world has become more digitally dependent and vulnerable than ever. Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic provides cutting-edge research on the best guidelines for preventing, detecting, and responding to cyber threats within educational, business, health, and governmental organizations during the COVID-19 pandemic. It further highlights the importance of focusing on cybersecurity within organizational crisis management. Covering topics such as privacy and healthcare, remote work, and personal health data, this premier reference source is an indispensable resource for startup companies, health and business executives, ICT procurement managers, IT professionals, libraries, students and educators of higher education, entrepreneurs, government officials, social media experts, researchers, and academicians.

Applying Integration Techniques and Methods in Distributed Systems (Hardcover): Gabor Kecskemeti Applying Integration Techniques and Methods in Distributed Systems (Hardcover)
Gabor Kecskemeti
R6,050 Discovery Miles 60 500 Ships in 18 - 22 working days

Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians.

Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Hardcover)
Miguel Fernandez, Alan Millington, Mark Monday
R1,097 Discovery Miles 10 970 Ships in 18 - 22 working days
Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover): Information Reso Management Association Cloud Security - Concepts, Methodologies, Tools, and Applications, VOL 4 (Hardcover)
Information Reso Management Association
R8,951 Discovery Miles 89 510 Ships in 18 - 22 working days
Heterogeneous Computing - Hardware and Software Perspectives (Hardcover): Mohamed Zahran Heterogeneous Computing - Hardware and Software Perspectives (Hardcover)
Mohamed Zahran
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

If you look around you will find that all computer systems, from your portable devices to the strongest supercomputers, are heterogeneous in nature. The most obvious heterogeneity is the existence of computing nodes of different capabilities (e.g. multicore, GPUs, FPGAs, ...). But there are also other heterogeneity factors that exist in computing systems, like the memory system components, interconnection, etc. The main reason for these different types of heterogeneity is to have good performance with power efficiency. Heterogeneous computing results in both challenges and opportunities. This book discusses both. It shows that we need to deal with these challenges at all levels of the computing stack: from algorithms all the way to process technology. We discuss the topic of heterogeneous computing from different angles: hardware challenges, current hardware state-of-the-art, software issues, how to make the best use of the current heterogeneous systems, and what lies ahead. The aim of this book is to introduce the big picture of heterogeneous computing. Whether you are a hardware designer or a software developer, you need to know how the pieces of the puzzle fit together. The main goal is to bring researchers and engineers to the forefront of the research frontier in the new era that started a few years ago and is expected to continue for decades. We believe that academics, researchers, practitioners, and students will benefit from this book and will be prepared to tackle the big wave of heterogeneous computing that is here to stay.

Deep Learning through Sparse and Low-Rank Modeling (Paperback): Zhangyang Wang, Yun Fu, Thomas S. Huang Deep Learning through Sparse and Low-Rank Modeling (Paperback)
Zhangyang Wang, Yun Fu, Thomas S. Huang
R2,065 Discovery Miles 20 650 Ships in 10 - 15 working days

Deep Learning through Sparse Representation and Low-Rank Modeling bridges classical sparse and low rank models-those that emphasize problem-specific Interpretability-with recent deep network models that have enabled a larger learning capacity and better utilization of Big Data. It shows how the toolkit of deep learning is closely tied with the sparse/low rank methods and algorithms, providing a rich variety of theoretical and analytic tools to guide the design and interpretation of deep learning models. The development of the theory and models is supported by a wide variety of applications in computer vision, machine learning, signal processing, and data mining. This book will be highly useful for researchers, graduate students and practitioners working in the fields of computer vision, machine learning, signal processing, optimization and statistics.

Cloud Computing: Systems and Technologies (Hardcover): Amanda Wegener Cloud Computing: Systems and Technologies (Hardcover)
Amanda Wegener
R3,218 R2,913 Discovery Miles 29 130 Save R305 (9%) Ships in 18 - 22 working days
Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Security and Threats - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,416 Discovery Miles 94 160 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fieldbus Technology - Industrial Network…
Nitaigour P. Mahalik Hardcover R5,481 Discovery Miles 54 810
Labyrinth of Refrain: Coven of Dusk
R1,392 R991 Discovery Miles 9 910
Sun and Moon Signs - Secrets of the 12…
Mari Silva Hardcover R752 R666 Discovery Miles 6 660
Cable Guys Controller and Smartphone…
R391 Discovery Miles 3 910
Tarot Reading for Dummies - Beginner's…
Shelly O'Bryan Hardcover R661 R590 Discovery Miles 5 900
Ordering Phenomena in Rare-Earth…
Matthias Hepting Hardcover R3,246 Discovery Miles 32 460
Turning And Turning - Exploring The…
Judith February Paperback R280 R254 Discovery Miles 2 540
High-Temperature Cuprate Superconductors…
Nikolay Plakida Hardcover R5,266 Discovery Miles 52 660
Sabotage - Eskom Under Siege
Kyle Cowan Paperback  (2)
R340 R314 Discovery Miles 3 140
Finite Automata and Application to…
Renji Tao Hardcover R4,068 Discovery Miles 40 680

 

Partners