0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (282)
  • R250 - R500 (874)
  • R500+ (13,635)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Coding for Penetration Testers - Building Better Tools (Paperback): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback)
Jason Andress, Ryan Linn
R804 R647 Discovery Miles 6 470 Save R157 (20%) Ships in 10 - 15 working days

Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. "Coding for Penetration Testers" provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real-world scenarios and tool development that can be incorporated into a tester's toolkit.
Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting

The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover): Christian Espinosa The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover)
Christian Espinosa
R668 Discovery Miles 6 680 Ships in 10 - 15 working days
Augmented Reality and Virtual Reality - The Power of AR and VR for Business (Hardcover, 1st ed. 2019): M. Claudia Tom Dieck,... Augmented Reality and Virtual Reality - The Power of AR and VR for Business (Hardcover, 1st ed. 2019)
M. Claudia Tom Dieck, Timothy Jung
R4,646 Discovery Miles 46 460 Ships in 10 - 15 working days

This book presents a collection of the latest research in the area of immersive technologies, presented at the International Augmented and Virtual Reality Conference 2018 in Manchester, UK, and showcases how augmented reality (AR) and virtual reality (VR) are transforming the business landscape. Innovations in this field are seen as providing opportunities for businesses to offer their customers unique services and experiences. The papers gathered here advance the state of the art in AR/VR technologies and their applications in various industries such as healthcare, tourism, hospitality, events, fashion, entertainment, retail, education and gaming. The volume collects contributions by prominent computer and social sciences experts from around the globe. Addressing the most significant topics in the field of augmented and virtual reality and sharing the latest findings, it will be of interest to academics and practitioners alike.

Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.): Robinson E. Pino, Alexander Kott, Michael... Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.)
Robinson E. Pino, Alexander Kott, Michael Shevenell
R3,877 R3,324 Discovery Miles 33 240 Save R553 (14%) Ships in 10 - 15 working days

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R699 R628 Discovery Miles 6 280 Save R71 (10%) Ships in 18 - 22 working days
Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.): Jan-Frederik Kremer, Benedikt... Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.)
Jan-Frederik Kremer, Benedikt Muller
R4,056 Discovery Miles 40 560 Ships in 10 - 15 working days

Cyberspace is everywhere in today s world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice.

In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches.

Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations."

Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications (Hardcover): Indranil Bose Breakthrough Perspectives in Network and Data Communications Security, Design, and Applications (Hardcover)
Indranil Bose
R4,942 Discovery Miles 49 420 Ships in 18 - 22 working days

Modern organizations are critically dependent on data communications and network systems utilized in managing information and communications, vital to continuity and success of operations. ""Breakthrough Perspectives in Network and Data Communications Security, Design and Applications"" addresses key issues and offers expert viewpoints into the field of network and data communications, providing the academic, information technology, and managerial communities with the understanding necessary to implement robust, secure, and effective solutions. This much-needed addition to library and professional collections offers a matchless set of high quality research articles and premier technologies to address the most salient issues in network and data communications.

Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019): Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal,... Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019)
Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal, Raghvendra Kumar
R2,677 Discovery Miles 26 770 Ships in 18 - 22 working days

The book describes the emergence of big data technologies and the role of Spark in the entire big data stack. It compares Spark and Hadoop and identifies the shortcomings of Hadoop that have been overcome by Spark. The book mainly focuses on the in-depth architecture of Spark and our understanding of Spark RDDs and how RDD complements big data's immutable nature, and solves it with lazy evaluation, cacheable and type inference. It also addresses advanced topics in Spark, starting with the basics of Scala and the core Spark framework, and exploring Spark data frames, machine learning using Mllib, graph analytics using Graph X and real-time processing with Apache Kafka, AWS Kenisis, and Azure Event Hub. It then goes on to investigate Spark using PySpark and R. Focusing on the current big data stack, the book examines the interaction with current big data tools, with Spark being the core processing layer for all types of data. The book is intended for data engineers and scientists working on massive datasets and big data technologies in the cloud. In addition to industry professionals, it is helpful for aspiring data processing professionals and students working in big data processing and cloud computing environments.

Streaming Analytics - Concepts, architectures, platforms, use cases and applications (Hardcover): Pethuru Raj, Chellammal... Streaming Analytics - Concepts, architectures, platforms, use cases and applications (Hardcover)
Pethuru Raj, Chellammal Surianarayanan, Koteeswaran Seerangan, George Ghinea
R3,444 R3,108 Discovery Miles 31 080 Save R336 (10%) Ships in 18 - 22 working days

When digitized entities, connected devices and microservices interact purposefully, we end up with a massive amount of multi-structured streaming (real-time) data that is continuously generated by different sources at high speed. Streaming analytics allows the management, monitoring, and real-time analytics of live streaming data. The topic has grown in importance due to the emergence of online analytics and edge and IoT platforms. A real digital transformation is being achieved across industry verticals through meticulous data collection, cleansing and crunching in real time. Capturing and subjecting those value-adding events is considered to be the prime task for achieving trustworthy and timely insights. The authors articulate and accentuate the challenges widely associated with streaming data and analytics, describe data analytics algorithms and approaches, present edge and fog computing concepts and technologies and show how streaming analytics can be accomplished in edge device clouds. They also delineate several industry use cases across cloud system operations in transportation and cyber security and other business domains. The book will be of interest to ICTs industry and academic researchers, scientists and engineers as well as lecturers and advanced students in the fields of data science, cloud/fog/edge architecture, internet of things and artificial intelligence and related fields of applications. It will also be useful to cloud/edge/fog and IoT architects, analytics professionals, IT operations teams and site reliability engineers (SREs).

Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015): Sherali Zeadally,... Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015)
Sherali Zeadally, Mohamad Badra
R2,411 Discovery Miles 24 110 Ships in 10 - 15 working days

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.

Amazon QuickSight User Guide (Hardcover): Documentation Team Amazon QuickSight User Guide (Hardcover)
Documentation Team
R2,753 Discovery Miles 27 530 Ships in 18 - 22 working days
Smart Buildings Digitalization, Two Volume Set (Hardcover): O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban Smart Buildings Digitalization, Two Volume Set (Hardcover)
O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban
R8,953 Discovery Miles 89 530 Ships in 10 - 15 working days

A smart building is the state-of-art in building with features that facilitates informed decision making based on the available data through smart metering and IoT sensors. This set provides useful information for developing smart buildings including significant improvement of energy efficiency, implementation of operational improvements and targeting sustainable environment to create an effective customer experience. It includes case studies from industrial results which provide cost effective solutions and integrates the digital SCADE solution. Describes complete implication of smart buildings via industrial, commercial and community platforms Systematically defines energy-efficient buildings, employing power consumption optimization techniques with inclusion of renewable energy sources Covers data centre and cyber security with excellent data storage features for smart buildings Includes systematic and detailed strategies for building air conditioning and lighting Details smart building security propulsion. This set is aimed at graduate students, researchers and professionals in building systems, architectural, and electrical engineering.

Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover): Alex Chi Keung Ng Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover)
Alex Chi Keung Ng
R4,340 Discovery Miles 43 400 Ships in 18 - 22 working days

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization's identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.

Communicating with XML (Hardcover, 2011): Airi Salminen, Frank Tompa Communicating with XML (Hardcover, 2011)
Airi Salminen, Frank Tompa
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This book provides extensive insight into the possibilities and challenges of XML in building new information management solutions in networked organizations. After a brief introduction to Web communication features and XML fundamentals, the book examines the benefits of adopting XML and illustrates various types of XML use: XML in document management; XML for data-centric and multimedia components; XML as a format for metadata, including metadata for the Semantic Web; and XML in support of data interchange between software applications and among organizations. The challenges of adopting XML in large-scale information management are also discussed. In addition, applications across a broad spectrum are examined and numerous case studies pertaining to the adoption of XML are presented. The book is particularly suitable for courses offered in Information Studies, Information Systems, or Information Technology. It also serves as an excellent practical guide for professionals in information management and provides important support material for courses in Computer Science and in Business.

Multimedia Data Engineering Applications and Processing (Hardcover, New): Shu-Ching Chen, Mei-Ling Shyu Multimedia Data Engineering Applications and Processing (Hardcover, New)
Shu-Ching Chen, Mei-Ling Shyu
R4,821 Discovery Miles 48 210 Ships in 18 - 22 working days

With a variety of media types, multimedia data engineering has emerged as a new opportunity to create techniques and tools that empower the development of the next generation of multimedia databases and information systems. Multimedia Data Engineering Applications and Processing presents different aspects of multimedia data engineering and management research. This collection of recent theories, technologies and algorithms brings together a detailed understanding of multimedia engineering and its applications. This reference source will be of essential use for researchers, scientists, professionals and software engineers in the field of multimedia.

Complex Networks (Hardcover, 2013 ed.): Ronaldo Menezes, Alexandre Evsukoff, Marta C. Gonzalez Complex Networks (Hardcover, 2013 ed.)
Ronaldo Menezes, Alexandre Evsukoff, Marta C. Gonzalez
R2,676 Discovery Miles 26 760 Ships in 18 - 22 working days

In the last decade we have seen the emergence of a new inter-disciplinary field concentrating on the understanding large networks which are dynamic, large, open, and have a structure that borders order and randomness. The field of Complex Networks has helped us better understand many complex phenomena such as spread of decease, protein interaction, social relationships, to name but a few.

The field of Complex Networks has received a major boost caused by the widespread availability of huge network data resources in the last years. One of the most surprising findings is that real networks behave very distinct from traditional assumptions of network theory. Traditionally, real networks were supposed to have a majority of nodes of about the same number of connections around an average. This is typically modeled by random graphs. But modern network research could show that the majority of nodes of real networks is very low connected, and, by contrast, there exists some nodes of very extreme connectivity (hubs).

The current theories coupled with the availability of data makes the field of Complex Networks (sometimes called Network Sciences) one of the most promising interdisciplinary disciplines of today. This sample of works in this book gives as a taste of what is in the horizon such controlling the dynamics of a network and in the network, using social interactions to improve urban planning, ranking in music, and the understanding knowledge transfer in influence networks."

Network Simulation Experiments Manual (Paperback, 3rd edition): Emad Aboelela Network Simulation Experiments Manual (Paperback, 3rd edition)
Emad Aboelela
R701 Discovery Miles 7 010 Ships in 10 - 15 working days

Networking technologies and concepts are often difficult to explain, even through careful description and well thought out examples. One method for making this information "stick" is to create an environment where networking professionals and students can visualize how networks work by utilizing a software tool that simulates the functions within a network. The tool provides a virtual environment for an assortment of desirable features such as modeling a network based on specified criteria and predicting its performance.

"The Network Simulation Experiments Manual" takes this instructional tool a step further and provides detailed experiments on core networking topologies for use in this simulation environment. Various scenarios are presented within each topology: Review questions, suggested readings, a lab report, and exercises accompanying each assignment. The manual also comes with directions for downloading the free and easy-to-install OPNET IT Guru Academic Edition software. This software provides a virtual environment for modeling, analyzing, and predicting the performance of IT infrastructures, including applications, servers, and networking technologies. Prepared by Professor Emad Aboelela of the Taibah University, Saudi Arabia, the experiments in the manual are closely tied to the organization of "Computer Networks: A Systems Approach, Fifth Edition" and, when used together, serve as a complete tool for understanding how and why computer networks function as they do.
*Updated and expanded by aninstructor who has used OPNET simulation tools in his classroom for numerous demonstrations and real-world scenarios.
* Software download based on an award-winning product made by OPNET Technologies, Inc., whose software is used by thousands of commercial and government organizations worldwide, and by over 500 universities.
*Useful experimentation for professionals in the workplace who are interested in learningand demonstrating the capability of evaluating different commercial networking products, i.e., Cisco routers.
*Covers the core networking topologies and includes assignments on Switched LANs, Network Design, CSMA, RIP, TCP, Queuing Disciplines, Web Caching, etc."

Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,891 Discovery Miles 48 910 Ships in 18 - 22 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Spatial Network Big Databases - Queries and Storage Methods (Hardcover, 1st ed. 2017): Kwangsoo Yang, Shashi Shekhar Spatial Network Big Databases - Queries and Storage Methods (Hardcover, 1st ed. 2017)
Kwangsoo Yang, Shashi Shekhar
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

This book provides a collection of concepts, algorithms, and techniques that effectively harness the power of Spatial Network Big Data. Reading this book is a first step towards understanding the immense challenges and novel applications of SNBD database systems. This book explores these challenges via investigating scalable graph-based query processing strategies and I/O efficient storage and access methods. This book will be of benefit to academics, researchers, engineers with a particular interest in network database models, network query processing, and physical storage models.

Managing Big Data in Cloud Computing Environments (Hardcover): Zongmin Ma Managing Big Data in Cloud Computing Environments (Hardcover)
Zongmin Ma
R4,932 Discovery Miles 49 320 Ships in 18 - 22 working days

Cloud computing has proven to be a successful paradigm of service-oriented computing, and has revolutionized the way computing infrastructures are abstracted and used. By means of cloud computing technology, massive data can be managed effectively and efficiently to support various aspects of problem solving and decision making. Managing Big Data in Cloud Computing Environments explores the latest advancements in the area of data management and analysis in the cloud. Providing timely, research-based information relating to data storage, sharing, extraction, and indexing in cloud systems, this publication is an ideal reference source for graduate students, IT specialists, researchers, and professionals working in the areas of data and knowledge engineering.

Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013... Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013 ed.)
Dmitry Korzun, Andrei Gurtov
R4,027 R3,496 Discovery Miles 34 960 Save R531 (13%) Ships in 10 - 15 working days

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests.

"Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."

Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015): George S. Oreku, Tamara Pazynyuk Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015)
George S. Oreku, Tamara Pazynyuk
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

The UNESCO Memory of the World Programme - Key Aspects and Recent Developments (Hardcover, 1st ed. 2020): Ray Edmondson, Lothar... The UNESCO Memory of the World Programme - Key Aspects and Recent Developments (Hardcover, 1st ed. 2020)
Ray Edmondson, Lothar Jordan, Anca Claudia Prodan
R3,380 Discovery Miles 33 800 Ships in 18 - 22 working days

The volume "The UNESCO Memory of the World Programme: Key Aspects and Recent Developments" responds to the growing interest in the scientific study of the Memory of the World Programme (MoW) and its core concept of documentary heritage, which has received little attention from scholarship so far. This sixth publication in the Heritage Studies Series provides a first collection of differing approaches (including reflected reports, essays, research contributions, and theoretical reflections) for the study of the MoW Programme, offering a basis for follow-up activities. The volume, edited by Ray Edmondson, Lothar Jordan and Anca Claudia Prodan, brings together 21 scholars from around the globe to present aspects deemed crucial for understanding MoW, its development, relevance and potential. The aim is to encourage academic research on MoW and to enhance the understanding of its potential and place within Heritage Studies and beyond.

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover): Sunita Vikrant Dhavale Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover)
Sunita Vikrant Dhavale
R5,453 Discovery Miles 54 530 Ships in 18 - 22 working days

In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.

Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016): Eman El-Sheikh,... Emerging Trends in the Evolution of Service-Oriented and Enterprise Architectures (Hardcover, 1st ed. 2016)
Eman El-Sheikh, Alfred Zimmermann, Lakhmi C. Jain
R4,185 R3,384 Discovery Miles 33 840 Save R801 (19%) Ships in 10 - 15 working days

This book presents emerging trends in the evolution of service-oriented and enterprise architectures. New architectures and methods of both business and IT are integrating services to support mobility systems, Internet of Things, Ubiquitous Computing, collaborative and adaptive business processes, Big Data, and Cloud ecosystems. They inspire current and future digital strategies and create new opportunities for the digital transformation of next digital products and services. Services Oriented Architectures (SOA) and Enterprise Architectures (EA) have emerged as a useful framework for developing interoperable, large-scale systems, typically implementing various standards, like Web Services, REST, and Microservices. Managing the adaptation and evolution of such systems presents a great challenge. Service-Oriented Architecture enables flexibility through loose coupling, both between the services themselves and between the IT organizations that manage them. Enterprises evolve continuously by transforming and extending their services, processes and information systems. Enterprise Architectures provide a holistic blueprint to help define the structure and operation of an organization with the goal of determining how an organization can most effectively achieve its objectives. The book proposes several approaches to address the challenges of the service-oriented evolution of digital enterprise and software architectures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Research Anthology on Architectures…
Information R Management Association Hardcover R12,620 Discovery Miles 126 200
CCNA 200-301 Network Simulator
Sean Wilkins Digital product license key R2,877 Discovery Miles 28 770
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
Practical Modern SCADA Protocols - DNP3…
Gordon Clarke, Deon Reynders Paperback R1,469 Discovery Miles 14 690

 

Partners