0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (322)
  • R250 - R500 (923)
  • R500+ (16,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Managing Project Competence - The Lemon and the Loop (Paperback): Rolf Medina Managing Project Competence - The Lemon and the Loop (Paperback)
Rolf Medina
R1,376 Discovery Miles 13 760 Ships in 12 - 17 working days

For companies to be successful, the management of an organization needs to understand how competence evolves and how it can be utilized and linked to the organization's goals. When executive managers understand this, there is a higher probability that the people working in the organization will be more satisfied with their working situation. Satisfaction increases because competence will likely be central in the organization, with focus on motivating people to develop new competence, healthy internal mobility, and organizational learning. Positively managing competence in most cases leads to a win-win situation for the company and the individual. This book describes how we as individuals, as well as organizations, can be efficient in the development and utilization of competence. It takes two perspectives of competence and connects them in a project-intensive and knowledge-intensive context. The first perspective is the "Lemon," which focuses on individual competence and the role of organizational culture. The Lemon framework takes the concept of competence based on knowledge and experience and explains how a person can apply knowledge and experience to different contexts. It changes the concept of competence from being static to being agile and dynamic. The second perspective of competence is the "Loop," which models how organizations can manage not only to the benefit of organizational strategies and goals but also to an individual's future career. The Lemon and the Loop are the basic tools to make competence and performance management agile and effective. This book presents practical ways to acquire new knowledge and skills. One method is REPI (Reflection, Elaboration, Practicing/Participation, and Investigation), which can be used for training, coaching, competence development, agile performance management, and much more. Readers of the book are given new insight into the concept of competence and how both people and organizations ca

Ethics and Governance in Project Management - Small Sins Allowed and the Line of Impunity (Paperback): Eduardo Victor Lopez,... Ethics and Governance in Project Management - Small Sins Allowed and the Line of Impunity (Paperback)
Eduardo Victor Lopez, Alicia Medina
R1,373 Discovery Miles 13 730 Ships in 12 - 17 working days

This book shows executive, project, program, and portfolio managers how ethical behavior can ensure that an organization has proper governance. Improper governance and unethical behavior have led to such well-known financial disasters as Enron and Madoff Investments. The book arms managers with two important tools: Small Sins Allowed (SSA) and Line of Impunity (LoI), which together can be the foundation for renewed and vigorous corporate governance. SSA is a powerful tool that helps managers establish a level above which adherence to ethical standards is expected. LoI aids managers in identifying ethical fault lines that may exist in a company and helps to keep unethical behavior in check.

Multi-Carrier Communication Systems with Examples in MATLAB (R) - A New Perspective (Paperback): Emad  Hassan Multi-Carrier Communication Systems with Examples in MATLAB (R) - A New Perspective (Paperback)
Emad Hassan
R1,690 Discovery Miles 16 900 Ships in 12 - 17 working days

Detailing the advantages and limitations of multi-carrier communication, this book proposes possible solutions for these limitations. Multi-Carrier Communication Systems with Examples in MATLAB (R): A New Perspective addresses the two primary drawbacks of orthogonal frequency division multiplexing (OFDM) communication systems: the high sensitivity to carrier frequency offsets and phase noise, and the high peak-to-average power ratio (PAPR) of the transmitted signals. Presenting a new interleaving scheme for multicarrier communication, the book starts with a detailed overview of multi-carrier systems such as OFDM, multi-carrier code division multiple access (MC-CDMA), and single-carrier frequency division multiple access (SC-FDMA) systems. From there, it proposes a new way to deal with the frequency-selective fading channel: the single-carrier with frequency domain equalization (SC-FDE) scheme. The second part of the book examines the performance of the continuous phase modulation (CPM)-based OFDM (CPM-OFDM) system. It proposes a CPM-based single-carrier frequency domain equalization (CPM-SC-FDE) structure for broadband wireless communication systems. In the third part of the book, the author proposes a chaotic interleaving scheme for both CPM-OFDM and the CPM-SC-FDE systems. A comparison between the proposed chaotic interleaving and the conventional block interleaving is also performed in this part. The final part of the book presents efficient image transmission techniques over multi-carrier systems such as OFDM, MC-CDMA, and SC-FDMA. It details a new approach for efficient image transmission over OFDM and MC-CDMA systems using chaotic interleaving that transmits images over wireless channels efficiently. The book studies the performance of discrete cosine transform-based single-carrier frequency division multiple access (DCT-SC-FDMA) with image transmission. It also proposes a CPM-based DCT-SC-FDMA structure for efficient image transmission. The book includes MATLAB (R) simulations along with MATLAB code so you can practice carrying out your own extensive simulations.

Financial Crimes - A Threat to Global Security (Paperback): Maximilian Edelbacher, Peter Kratcoski, Michael Theil Financial Crimes - A Threat to Global Security (Paperback)
Maximilian Edelbacher, Peter Kratcoski, Michael Theil
R1,491 Discovery Miles 14 910 Ships in 12 - 17 working days

Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity-including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the mos

Smart Grid - Networking, Data Management, and Business Models (Paperback): Melike Erol Kantarci, Hussein Mouftah Smart Grid - Networking, Data Management, and Business Models (Paperback)
Melike Erol Kantarci, Hussein Mouftah
R2,189 Discovery Miles 21 890 Ships in 12 - 17 working days

Smart Grid: Networking, Data Management, and Business Models delivers a comprehensive overview of smart grid communications, discussing the latest advances in the technology, the related cyber security issues, and the best ways to manage user demand and pricing. Comprised of 16 chapters authored by world-renowned experts, this book: Considers the use of cognitive radio and software-defined networking in the smart grid Explores the space of attacks in the energy management process, the need for a smart grid simulator, and the management issues that arise around smart cities Describes a real-time pricing scheme that aims to reduce the peak-to-average load ratio Explains how to realize low-carbon economies and the green smart grid through the pervasive management of demand Presents cutting-edge research on microgrids, electric vehicles, and energy trading in the smart grid Thus, Smart Grid: Networking, Data Management, and Business Models provides a valuable reference for utility operators, telecom operators, communications engineers, power engineers, electric vehicle original equipment manufacturers (OEMs), electric vehicle service providers, university professors, researchers, and students.

Urbanization, Policing, and Security - Global Perspectives (Paperback): Gary Cordner, AnnMarie Cordner, Dilip K Das Urbanization, Policing, and Security - Global Perspectives (Paperback)
Gary Cordner, AnnMarie Cordner, Dilip K Das
R1,506 Discovery Miles 15 060 Ships in 12 - 17 working days

In terms of raw numbers, the amount of world urban dwellers have increased four-fold, skyrocketing from 740 million in 1950 to almost 3.3 billion in 2007. This ongoing urbanization will continue to create major security challenges in most countries. Based on contributions from academics and practitioners from countries as diverse as Nigeria, Pakistan, Azerbaijan, and the US, Urbanization, Policing, and Security: Global Perspectives highlights the crime and disorder problems associated with urbanization and demonstrates police and private security responses to those problems. Examines responses to urban problems The book draws on the practical experiences of police officials and the academic insights of researchers from around the world to detail the consequences of urbanization - crime, terrorism, disorder, drugs, traffic crashes - as well as modern responses to those problems. Covering studies on major cities in more than 18 countries, this text explores topics such as the role of urbanization in security and global concerns including transnational crime, racial profiling, and information sharing. The book also examines responses to urban problems associated with police and security, including human rights activism and police reform. The tools to devise sophisticated solutions The problems confronting policing in these times are quite daunting, providing plenty of challenges for police leaders and requiring them to devise increasingly sophisticated solutions. With more than 100 photos and illustrations, the book tackles issues from a different angle. It examines the resources required to solve problems and those necessary to build a knowledge base of policing and the professionalism for police forces.

Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Paperback): S. Caroline Taylor, Daniel Joseph... Policing Global Movement - Tourism, Migration, Human Trafficking, and Terrorism (Paperback)
S. Caroline Taylor, Daniel Joseph Torpy, Dilip K Das
R1,478 Discovery Miles 14 780 Ships in 12 - 17 working days

The movement of humans across borders is increasing exponentially-some for benign reasons, others nefarious, including terrorism, human trafficking, and people smuggling. Consequently, the policing of human movement within and across borders has been and remains a significant concern to nations. Policing Global Movement: Tourism, Migration, Human Trafficking, and Terrorism explores the nature of these challenges for police, governments, and citizens at large. Drawn from keynote and paper presentations at a recent International Police Executive Symposium meeting in Malta, the book presents the work of scholars and practitioners who analyze a variety of topics on the cutting edge of global policing, including: Western attempts to reform the policing of sex tourists in the Philippines and Gambia Policing the flow of people and goods in the port of Rotterdam Policing protestors and what happened at the 2010 G20 Summit in Toronto Mexico's use of the military in its war against drug trafficking Public-private cooperation in the fight against organized crime and terrorism in Australia Recommendations for police reform in Afghanistan Sweden's national counterterrorism unit Treatment of asylum seekers in a privately run detention center in South Africa The policing of human trafficking for the sex trade in sub-Saharan Africa, Vietnam, Australia, and Andhra Pradesh, India Examining areas of increasing concern to governments and citizens around the world, this timely volume presents critical international perspectives on these ongoing global challenges that threaten the safety of humans worldwide.

Routledge Handbook of International Cybersecurity (Paperback): Eneken Tikk, Mika Kerttunen Routledge Handbook of International Cybersecurity (Paperback)
Eneken Tikk, Mika Kerttunen
R1,412 Discovery Miles 14 120 Ships in 9 - 15 working days

The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. The volume is split into four thematic sections: Concepts and frameworks; Challenges to secure and peaceful cyberspace; National and regional perspectives on cybersecurity; Global approaches to cybersecurity. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general. Chapter 30 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license at https://www.routledge.com/Routledge-Handbook-of-International-Cybersecurity/Tikk-Kerttunen/p/book/9781138489011

Applied Software Risk Management - A Guide for Software Project Managers (Paperback): C. Ravindranath Pandian Applied Software Risk Management - A Guide for Software Project Managers (Paperback)
C. Ravindranath Pandian
R1,744 Discovery Miles 17 440 Ships in 12 - 17 working days

Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes. Bringing together concepts across software engineering with a project management perspective, Applied Software Risk Management: A Guide for Software Project Managers presents a rigorous, scientific method for identifying, analyzing, and resolving risk.

Retail Security and Loss Prevention Solutions (Paperback): Alan Greggo, Millie Kresevich Retail Security and Loss Prevention Solutions (Paperback)
Alan Greggo, Millie Kresevich
R1,088 Discovery Miles 10 880 Ships in 12 - 17 working days

Employee theft amounts to roughly $36.6 billion retail dollars lost annually, according to a 2008 National Retail Security Survey, and accounts for approximately 42.7 % of all retail losses. Each year organizations spend millions of dollars on theft detection/prevention devices yet still incur losses at the hands of their own employees; begging the question not of how theft occurs, but why. Discussing the concept of the Theft Triangle (opportunity, motivation, and insufficient deterrents), Retail Security and Loss Prevention Solutions investigates motivational factors that contribute to loss and describes philosophies that can change the entire spectrum of employee dishonesty. It cites the revolutionary approach adopted by the New York Subway System, demonstrating that by changing the overall presentation of the business and contending with the factors preceding the crime, the crime itself can be avoided. As the title "Loss Prevention Professional" implies, the intention is to stop the damage before it occurs. To this end, chapters discuss behaviors that precede a loss event, theoretical perspectives and research on employee deviance and motivation, and methods to control employee dishonesty through deterrents as well as ethical infrastructures. Detailing the intricacies of the Loss Prevention Profession and the myriad skills involved such as accounting, forensics, fraud detection, human behavior analysis, and interview/interrogation skills, the authors give advice on how to select the right individuals for the job and how to build a Loss Prevention department. They employ real life case studies and interviews and discuss the problems and solutions for the future of loss prevention as a whole.

Police Corruption - Preventing Misconduct and Maintaining Integrity (Paperback): Tim Prenzler Police Corruption - Preventing Misconduct and Maintaining Integrity (Paperback)
Tim Prenzler
R1,474 Discovery Miles 14 740 Ships in 12 - 17 working days

While many police officers undertake their work conforming to the highest ethical standards, the fact remains that unethical police conduct continues to be a recurring problem around the world. With examples from a range of jurisdictions, Police Corruption: Preventing Misconduct and Maintaining Integrity examines the causes of police misconduct and explores applied strategies designed to maximize ethical conduct and identify and prevent corruption. Analyzes the roots of corruption Introducing the phenomenon of police officer misconduct, the book provides an analysis of unethical behavior, its effects, and different causal factors. The author examines the impact on the community and the police themselves, the dilemma of establishing universal ethical principles, and ways of identifying and measuring misconduct problems. The remainder of the text examines applied strategies designed to maximize ethical conduct and prevent corruption. A myriad of proven strategies Exploring a wide range of approaches, the book discusses best practices in the recruitment of ethical applicants, strategies for dealing with misconduct, risk reduction strategies and early warning and intervention systems, along with advanced strategies such as drug and alcohol testing, integrity tests, and the use of covert surveillance. The text also explores the role of independent external oversight bodies that audit police strategies and conduct their own investigation. The final chapter on ethical leadership emphasizes the need to go beyond a checklist of rules with leadership that values, requires, and models integrity in all aspects of police work. Examples from around the world Taking a global approach, this volume recognizes that policing is prone to the same potential problems of corruption and misconduct everywhere in the world. Highlighting

Practical Handbook for Professional Investigators (Paperback, 3rd edition): Randy Dickson, Rory J.  McMahon, CLI, CFE Practical Handbook for Professional Investigators (Paperback, 3rd edition)
Randy Dickson, Rory J. McMahon, CLI, CFE
R1,521 Discovery Miles 15 210 Ships in 12 - 17 working days

An increase in fraud cases has escalated government accountability and corporate oversight, and media attention on cases ranging from missing persons to white-collar crime has increased the visibility of professional investigators. This has resulted in a great source of increased work for the profession. The third edition of Practical Handbook for Professional Investigators continues to supply an up-to-date, nuts-and-bolts learning tool for students and an everyday reference for investigative professionals at all levels. More relevant than ever, this edition adds two new chapters on death and terrorism investigations and several new sections, including: Insurance fraud, fire and arson investigation, and liability claims investigation Indicators of online marital infidelity Obtaining governmental records to locate people and sample reports for skip tracing Practical considerations for surveillance and procedures for interception of wire or oral communications Service of subpoenas for witnesses in federal courts Testifying in court-including witness and evidence preparation, trial tactics used by attorneys, and an investigator's rights as a witness The Rules of Professional Conduct Niche markets in the investigative industry Managing and marketing an investigative practice, running a paperless office, and customer retention An unparalleled guide to the ins and outs of private investigation, Practical Handbook for Professional Investigators, Third Edition belongs on the shelf of every professional and trainee. Rory McMahon appeared on Al Jazeera America to discuss his new investigation company, The Grafton Group.

Optical Modulation - Advanced Techniques and Applications in Transmission Systems and Networks (Paperback): Le Nguyen Binh Optical Modulation - Advanced Techniques and Applications in Transmission Systems and Networks (Paperback)
Le Nguyen Binh
R2,223 Discovery Miles 22 230 Ships in 12 - 17 working days

This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system. New digital techqniues such as chromatic dispersion, polarization mode dispersion, nonlinear phase distortion effects, etc. will be discussed. Practical models for practice and understanding the behavior and dynamics of the devices and systems will be included.

State Fragility Around the World - Fractured Justice and Fierce Reprisal (Paperback): Laurie A Gould, Matthew Pate State Fragility Around the World - Fractured Justice and Fierce Reprisal (Paperback)
Laurie A Gould, Matthew Pate
R1,092 Discovery Miles 10 920 Ships in 12 - 17 working days

Failed and fragile states often govern through the criminalization of otherwise inconsequential or tolerated acts. These weak states also frequently use kidnapping, murder, and other violent or oppressive tactics to maintain order and stay in power. State Fragility Around the World: Fractured Justice and Fierce Reprisal analyzes the path to state failure, one manifestation of which appears through the fragility and dysfunction of its criminal justice system. This book examines what happens when a government loses the ability, or will, to provide basic goods and services to its constituents. Acknowledging the tremendous variability of failed and fragile states, the case studies and analyses contained in this book suggest the existence of functional and structural attributes common across most state systems. The authors explore the plights of various states in which key elements related to their criminal justice systems are weak or fragile. States under examination include Mexico, Afghanistan, Iran, Syria, and Georgia. Special attention is given to Somalia, Sudan, and South Sudan, which serve as examples of what happens to a state that fails in virtually all aspects of governance. Using a unique approach, State Fragility Around the World articulates a specific method for assessing relative state fragility. Using this method, natural groupings of relative fragility and stability evolve, providing an unprecedented way to compare social phenomena and functionality across national and regional borders. Readers will also gain a deeper understanding of what it means to be a fragile state as well as how state fragility affects core freedoms, the criminal justice process, and mechanisms of punishment.

Psychology and Law in Europe - When West Meets East (Paperback): Par-Anders Granhag, Ray Bull, Alla Shaboltas, Elena Dozortseva Psychology and Law in Europe - When West Meets East (Paperback)
Par-Anders Granhag, Ray Bull, Alla Shaboltas, Elena Dozortseva
R1,094 Discovery Miles 10 940 Ships in 12 - 17 working days

Offering carefully curated articles from the European Association of Psychology and Law (EAPL), this book features chapters from a truly international group of scholars. This text is the first of its kind to offer insights into current developments in psychology and law in Russia. The field of psychology and law has a very long and strong tradition in Russia, but very little is known, as Russian scholars rarely publish their works in English. The volume also contains state-of-the-art chapters on topics at the very core of psychology and law, including offender profiling, lie detection, crime linking, false memories, and witness interviewing. Features Provides rare insight into Russian history of forensic and criminal psychology Covers core topics in the discipline Offers international scope from a diverse array of contributors Psychology and Law in Europe: When West Meets East is a text of interest for students of psychology, law, or criminal justice, as well as scholars and practitioners in the field. This text offers a window into global advances in psychology and law.

Brain Informatics - 15th International Conference, BI 2022, Padua, Italy, July 15-17, 2022, Proceedings (Paperback, 1st ed.... Brain Informatics - 15th International Conference, BI 2022, Padua, Italy, July 15-17, 2022, Proceedings (Paperback, 1st ed. 2022)
Mufti Mahmud, Jing He, Stefano Vassanelli, Andre Van Zundert, Ning Zhong
R2,354 Discovery Miles 23 540 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Brain Informatics, BI 2022, held as hybrid event in Padua, Italy (in person) and Queensland, Australia (online) in July 2022. The 29 papers were selected from 65 submissions and the main theme of BI 2022 is Brain Science meets Artificial Intelligence with respect to the five tracks: Cognitive and computational foundations of brain science; human information processing systems; brain big data analytics, curation and management; informatics paradigms for brain and mental health research; and brain-machine intelligence and brain inspired computing.

The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback)
James S. Tiller
R1,804 Discovery Miles 18 040 Ships in 12 - 17 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible. The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization. Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Context-Aware Pervasive Systems - Architectures for a New Breed of Applications (Paperback): Seng Loke Context-Aware Pervasive Systems - Architectures for a New Breed of Applications (Paperback)
Seng Loke
R1,800 Discovery Miles 18 000 Ships in 12 - 17 working days

The concept of aware systems is among the most exciting trends in computing today, fueled by recent developments in pervasive computing, including new computers worn by users, embedded devices, smart appliances, sensors, and varieties of wireless networking technology. Context-Aware Pervasive Systems: The Architecture of a New Breed of Applications introduces a diverse set of application areas and provides blueprints for building context-aware behavior into applications. Reviewing the anatomy of context-aware pervasive applications, this resource covers abstract architecture. It examines mobile services, appliances, smart devices, software agents, electronic communication, sensor networks, security frameworks, and intelligent software agents. The book also discusses the use of context awareness for communication among people, devices, and software agents and how sensors can be aware of their own situations. Exploring the use of physical context for controlling and enhancing security in pervasive computing environments, this guide addresses mirror worlds and elucidates design perspectives based on a declarative programming language paradigm. This carefully paced volume presents a timely and relevant introduction to the emergence of context-aware systems and brings together architectures and principles of context-aware computing in one source.

Flutter and Dart Cookbook (Paperback): Rich Rose Flutter and Dart Cookbook (Paperback)
Rich Rose
R1,281 R1,123 Discovery Miles 11 230 Save R158 (12%) Ships in 12 - 17 working days

Learn the essentials of working with Flutter and Dart to build full stack applications that meet the needs of a cloud-driven world. Together, the Flutter open source UI software development kit and the Dart programming language for client development provide a unified solution to building applications capable of targeting multiple platforms. Recipes in this cookbook show you how this potent combination provides an efficient approach to application development. Typically used in frontend development, Flutter helps you develop cross-platform applications for Android, iOS, Linux, Mac, Windows, and the Google Fuchsia operating system. The Dart SDK provides native access to third-party solutions, including APIs, databases, and authentication. When used in concert with Flutter, Dart allows you to compile source code ahead of time to native code. This cookbook shows you how to: Write effective Dart code by using variables and data structures Build applications with Flutter by exploring widgets and data handling Understand cloud provider solutions and learn how to integrate them with Flutter Manage data through APIs using Google Cloud Serverless Work with Firebase solutions such as Authentication and the Cloud Firestore database Build web applications that also work with mobile and desktop platforms

Business Data Communications and Networking, Fourt eenth Edition (Paperback, 14th Edition): Fitzgerald Business Data Communications and Networking, Fourt eenth Edition (Paperback, 14th Edition)
Fitzgerald
R2,174 Discovery Miles 21 740 Ships in 12 - 17 working days

Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies. The text provides a balanced, well-rounded presentation of data communications while highlighting its importance to nearly every aspect of modern business. This fully-updated new edition helps students understand how networks work and what is required to build and manage scalable, mobile, and secure networks. Clear, student-friendly chapters introduce, explain, and summarize fundamental concepts and applications such as server architecture, network and transport layers, network design processes and tools, wired and wireless networking, and network security and management. An array of pedagogical features teaches students how to select the appropriate technologies necessary to build and manage networks that meet organizational needs, maximize competitive advantage, and protect networks and data from cybersecurity threats. Discussions of real-world management and technical issues, from improving device performance to assessing and controlling costs, provide students with insight into the daily networking operations of actual businesses.

Designing the Internet of Things (Paperback): A McEwen Designing the Internet of Things (Paperback)
A McEwen
R724 R485 Discovery Miles 4 850 Save R239 (33%) Ships in 12 - 17 working days

Take your idea from concept to production with this unique guide

Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool design to create cutting-edge devices that are fun, interactive, and practical. If you'd like to create the next must-have product, this unique book is the perfect place to start.

Both a creative and practical primer, it explores the platforms you can use to develop hardware or software, discusses design concepts that will make your products eye-catching and appealing, and shows you ways to scale up from a single prototype to mass production.Helps software engineers, web designers, product designers, and electronics engineers start designing products using the Internet-of-Things approach Explains how to combine sensors, servos, robotics, Arduino chips, and more with various networks or the Internet, to create interactive, cutting-edge devices Provides an overview of the necessary steps to take your idea from concept through production

If you'd like to design for the future, "Designing the Internet of Things" is a great place to start.

The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Hardcover):... The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Hardcover)
Damilare D. Fagbemi, David Wheeler, J.C. Wheeler
R1,915 Discovery Miles 19 150 Ships in 12 - 17 working days

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Financial Services Information Systems (Paperback): Jessica Keyes Financial Services Information Systems (Paperback)
Jessica Keyes
R1,904 Discovery Miles 19 040 Ships in 12 - 17 working days

The calculus of IT support for the banking, securities, and insurance industries has changed dramatically and rapidly over the past few years. Consolidation and deregulation are creating opportunities and challenges never before seen. Unheard of just a few years ago, e-commerce has given birth to new infrastructures and departments needed to support them. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining. Get a handle on all these new and newer ripples with Financial Services Information Systems. Here, in this exhaustive new guide and reference book, industry guru Jessica Keyes gives you the no-nonsense scoop on not just the tried and true IT tools of today, but also the up-and-coming "hot" technologies of tomorrow, and how to plan for them. Financial Services Information Systems addresses challenges and solutions associated with: supporting the self-service revolution by servicing kiosks and ATMs efficiently and economically, straight-through processing for the securities industry, outsourcing business communications in the insurance industry, distributed integration as a cost-effective alternative to data warehousing, and putting inbound fax automation to work in financial organizations.

Resilient Space Systems Design - An Introduction (Hardcover): Ron Burch Resilient Space Systems Design - An Introduction (Hardcover)
Ron Burch
R3,387 Discovery Miles 33 870 Ships in 12 - 17 working days

Recognized as a "Recommended" title by Choice for their November 2020 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. Presenting a fundamental definition of resilience, the book examines the concept of resilience as it relates to space system design. The book establishes the required definitions, relates its place to existing state-of-the-art systems engineering practices, and explains the process and mathematical tools used to achieve a resilient design. It discusses a variety of potential threats and their impact upon a space system. By providing multiple, real-world examples to illustrate the application of the design methodology, the book covers the necessary techniques and tools, while guiding the reader through the entirety of the process. The book begins with space systems basics to ensure the reader is versed in the functions and components of the system prior to diving into the details of resilience. However, the text does not assume that the reader has an extensive background in the subject matter of resilience. This book is aimed at engineers and architects in the areas of aerospace, space systems, and space communications.

FISMA Principles and Best Practices - Beyond Compliance (Paperback): Patrick D. Howard FISMA Principles and Best Practices - Beyond Compliance (Paperback)
Patrick D. Howard
R1,816 Discovery Miles 18 160 Ships in 12 - 17 working days

While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls. Detailing a proven approach for establishing and implementing a comprehensive information security program, FISMA Principles and Best Practices: Beyond Compliance integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with FISMA requirements. Based on the author's experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, including the U.S. Department of Housing and Urban Development, the book gives you workable solutions for establishing and operating an effective security compliance program. It delineates the processes, practices, and principles involved in managing the complexities of FISMA compliance. Describing how FISMA can be used to form the basis for an enterprise security risk management program, the book: Provides a comprehensive analysis of FISMA requirements Highlights the primary considerations for establishing an effective security compliance program Illustrates successful implementation of FISMA requirements with numerous case studies Clarifying exactly what it takes to gain and maintain FISMA compliance, Pat Howard, CISO of the Nuclear Regulatory Commission, provides detailed guidelines so you can design and staff a compliance capability, build organizational relationships, gain management support, and integrate compliance into the system development life cycle. While there is no such thing as absolute protection, this up-to-date resource reflects th

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,271 Discovery Miles 12 710
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640
Designing Switch/Routers - Fundamental…
James Aweya Paperback R3,845 Discovery Miles 38 450
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R913 Discovery Miles 9 130
Im Abbreviations, Texting & Emoticons
BarCharts Inc Fold-out book or chart R675 Discovery Miles 6 750

 

Partners