0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (322)
  • R250 - R500 (923)
  • R500+ (16,348)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Information Security Cost Management (Paperback): Ioana V. Bazavan, Ian Lim Information Security Cost Management (Paperback)
Ioana V. Bazavan, Ian Lim
R1,805 Discovery Miles 18 050 Ships in 12 - 17 working days

While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- Focuses on setting the right road map so that you can be most effective in your information security implementations Discusses cost-effective staffing, the single biggest expense to the security organization Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively Identifies high-risk areas, focusing limited resources on the most imminent and severe threats Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.

Enterprise Architecture and New Generation Information Systems (Paperback): Dimitris N Chorafas Enterprise Architecture and New Generation Information Systems (Paperback)
Dimitris N Chorafas
R1,911 Discovery Miles 19 110 Ships in 12 - 17 working days

Based on an extensive research project done by the author in the United States, Britain, Germany, France, Switzerland, Sweden, and Austria from December 1999 to June 2001, Enterprise Architecture and New Generation Information Systems focuses on four main themes: Next Generation Information Technology The Likely Technologies of this Decade Enterprise Computing The Internet as the 21st Century's Answer to Merchandising While the majority of books presently available on information systems are written from the viewpoint of system analysis, programming, or common applications, this text: Brings to the reader's attention the importance of organization and infrastructure Presents a wealth of case studies to explain the need for reengineering and restructuring Details the latest advances which influence the implementation of advanced technology Written in a simple, comprehensive manner without specific prerequisites and data processing jargon, with concepts and case studies properly explained, this book addresses itself to practitioners in computer technology, telecommunications and software development, who are interested in acquiring skills through knowledge of the most advanced applications, tools, and methods, both present and coming. Enterprise Architecture and New Generation Information Systems will prove appealing to every person charged with planning, developing, applying, and delivering advanced information systems, architectural solutions, and programming products.

Privacy-Aware Knowledge Discovery - Novel Applications and New Techniques (Paperback): Francesco Bonchi, Elena Ferrari Privacy-Aware Knowledge Discovery - Novel Applications and New Techniques (Paperback)
Francesco Bonchi, Elena Ferrari
R1,935 Discovery Miles 19 350 Ships in 12 - 17 working days

Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results-they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. Divided into seven parts, the book provides in-depth coverage of the most novel reference scenarios for privacy-preserving techniques. The first part gives general techniques that can be applied to various applications discussed in the rest of the book. The second section focuses on the sanitization of network traces and privacy in data stream mining. After the third part on privacy in spatio-temporal data mining and mobility data analysis, the book examines time series analysis in the fourth section, explaining how a perturbation method and a segment-based method can tackle privacy issues of time series data. The fifth section on biomedical data addresses genomic data as well as the problem of privacy-aware information sharing of health data. In the sixth section on web applications, the book deals with query log mining and web recommender systems. The final part on social networks analyzes privacy issues related to the management of social network data under different perspectives. While several new results have recently occurred in the privacy, database, and data mining research communities, a uniform presentation of up-to-date techniques and applications is lacking. Filling this void, Privacy-Aware Knowledge Discovery presents novel algorithms, patterns, and models, along with a significant collection of open problems for future investigation.

Cloud Native Devops with Kubernetes 2e (Paperback, 2nd ed.): Justin Domingus Cloud Native Devops with Kubernetes 2e (Paperback, 2nd ed.)
Justin Domingus
R1,504 Discovery Miles 15 040 Ships in 12 - 17 working days

Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through the growing Kubernetes ecosystem and provides practical solutions to everyday problems with software tools currently in use. You'll walk through an example containerized application running in Kubernetes step-by-step, from the development environment through the continuous deployment pipeline, exploring patterns you can use for your own applications. Make your development teams lean, fast, and effective by adopting Kubernetes and DevOps principles. Understand containers and Kubernetes-no experience necessary Run your own applications on managed cloud Kubernetes services or on-prem environments Design your own cloud native services and infrastructure Use Kubernetes to manage resource usage and the container lifecycle Optimize clusters for cost, performance, resilience, capacity, and scalability Learn the best tools for developing, testing, and deploying your applications Apply the latest industry practices for observability and monitoring Secure your containers and clusters in production

System Firmware - An Essential Guide to Open Source and Embedded Solutions (Paperback, 1st ed.): Subrata Banik, Vincent Zimmer System Firmware - An Essential Guide to Open Source and Embedded Solutions (Paperback, 1st ed.)
Subrata Banik, Vincent Zimmer
R1,744 R1,375 Discovery Miles 13 750 Save R369 (21%) Ships in 10 - 15 working days

Find the right bootloader solution or combination of firmware required to boot a platform considering its security, product features, and optimized boot solutions. This book covers system boot firmware, focusing on real-world firmware migration from closed source to open source adaptation. The book provides an architectural overview of popular boot firmware. This includes both closed sourced and/or open source in nature, such as Unified Extensible Firmware Interface (UEFI), coreboot, and Slim Bootloader and their applicable market segments based on product development and deployment requirements. Traditional system firmware is often complex and closed sourced whereas modern firmware is still a kind of hybrid between closed and open source. But what might a future firmware model look like? The most simplistic boot firmware solution uses open source firmware development. This book helps you decide how to choose the right boot firmware for your products and develop your own boot firmware using open source. Coverage includes: Why open source firmware is used over closed source The pros and cons of closed and open source firmware A hybrid work model: for faster bring-up activity using closed source, binary integrated with open source firmware What You Will Learn Understand the architecture of standard and popular boot firmware Pick the correct bootloader for your required target hardware Design a hybrid workflow model for the latest chipset platform Understand popular payload architectures and offerings for embedded systems Select the right payload for your bootloader solution to boot to the operating system Optimize the system firmware boot time based on your target hardware requirement Know the product development cycle using open source firmware development Who This Book Is For Embedded firmware and software engineers migrating the product development from closed source firmware to open source firmware for product adaptation needs as well as engineers working for open source firmware development. A secondary audience includes engineers working on various bootloaders such as open source firmware, UEFI, and Slim Bootloader development, as well as undergraduate and graduate students working on developing firmware skill sets.

Challenges in Cybersecurity and Privacy - the European Research Landscape (Hardcover): Jorge Bernal Bernabe, Antonio Skarmeta Challenges in Cybersecurity and Privacy - the European Research Landscape (Hardcover)
Jorge Bernal Bernabe, Antonio Skarmeta
R2,806 Discovery Miles 28 060 Ships in 12 - 17 working days

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens' privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project's overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

Security within CONASENSE Paragon (Hardcover): Ramjee Prasad, Leo P. Ligthart Security within CONASENSE Paragon (Hardcover)
Ramjee Prasad, Leo P. Ligthart
R2,938 Discovery Miles 29 380 Ships in 12 - 17 working days

Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services within the broad platform of CTIF Global Capsule (CGC). This covers future technologies and its enablers, smart cities, crowd computing, reliable and secure communication interface, satellite unnamed air vehicles, wireless sensor networks, data analytics and deep learning, remotely piloted aircraft system and public safety, network neutrality, business ecosystem innovation and so on.

Acquiring Card Payments (Hardcover): Ilya Dubinsky Acquiring Card Payments (Hardcover)
Ilya Dubinsky
R3,075 Discovery Miles 30 750 Ships in 12 - 17 working days

This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology

Monitoring Laws - Profiling and Identity in the World State (Paperback, New Ed): Jake Goldenfein Monitoring Laws - Profiling and Identity in the World State (Paperback, New Ed)
Jake Goldenfein
R729 Discovery Miles 7 290 Ships in 9 - 15 working days

Our world and the people within it are increasingly interpreted and classified by automated systems. At the same time, automated classifications influence what happens in the physical world. These entanglements change what it means to interact with governance, and shift what elements of our identity are knowable and meaningful. In this cyber-physical world, or 'world state', what is the role for law? Specifically, how should law address the claim that computational systems know us better than we know ourselves? Monitoring Laws traces the history of government profiling from the invention of photography through to emerging applications of computer vision for personality and behavioral analysis. It asks what dimensions of profiling have provoked legal intervention in the past, and what is different about contemporary profiling that requires updating our legal tools. This work should be read by anyone interested in how computation is changing society and governance, and what it is about people that law should protect in a computational world.

Hacking the Human - Social Engineering Techniques and Security Countermeasures (Paperback): Ian Mann Hacking the Human - Social Engineering Techniques and Security Countermeasures (Paperback)
Ian Mann
R997 Discovery Miles 9 970 Ships in 12 - 17 working days

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.

Microsoft Azure Infrastructure Services for Architects - Designing Cloud Solutions (Paperback): J. Savill Microsoft Azure Infrastructure Services for Architects - Designing Cloud Solutions (Paperback)
J. Savill
R1,075 Discovery Miles 10 750 Ships in 12 - 17 working days

An expert guide for IT administrators needing to create and manage a public cloud and virtual network using Microsoft Azure With Microsoft Azure challenging Amazon Web Services (AWS) for market share, there has been no better time for IT professionals to broaden and expand their knowledge of Microsoft's flagship virtualization and cloud computing service. Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions helps readers develop the skills required to understand the capabilities of Microsoft Azure for Infrastructure Services and implement a public cloud to achieve full virtualization of data, both on and off premise. Microsoft Azure provides granular control in choosing core infrastructure components, enabling IT administrators to deploy new Windows Server and Linux virtual machines, adjust usage as requirements change, and scale to meet the infrastructure needs of their entire organization. This accurate, authoritative book covers topics including IaaS cost and options, customizing VM storage, enabling external connectivity to Azure virtual machines, extending Azure Active Directory, replicating and backing up to Azure, disaster recovery, and much more. New users and experienced professionals alike will: Get expert guidance on understanding, evaluating, deploying, and maintaining Microsoft Azure environments from Microsoft MVP and technical specialist John Savill Develop the skills to set up cloud-based virtual machines, deploy web servers, configure hosted data stores, and use other key Azure technologies Understand how to design and implement serverless and hybrid solutions Learn to use enterprise security guidelines for Azure deployment Offering the most up to date information and practical advice, Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions is an essential resource for IT administrators, consultants and engineers responsible for learning, designing, implementing, managing, and maintaining Microsoft virtualization and cloud technologies.

Effective Processes for Quality Assurance (Hardcover): Boyd L. Summers Effective Processes for Quality Assurance (Hardcover)
Boyd L. Summers
R2,333 Discovery Miles 23 330 Ships in 12 - 17 working days

Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

Information Systems - Debates, Applications and Impacts (Hardcover): Priya Seetharaman, Jocelyn Cranefield Information Systems - Debates, Applications and Impacts (Hardcover)
Priya Seetharaman, Jocelyn Cranefield
R4,134 Discovery Miles 41 340 Ships in 12 - 17 working days

This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world. Over this time, Information and Communications Technology (ICT) and Information Systems (IS) have come to play a critical role in supporting, complementing and automating managerial decisions, shaping and transforming industries, and contributing to deep societal and economic change. This volume examines a range of topics for those interested in the adoption and use of these technologies across varied situations. It combines empirical studies on the application and impact of IS with commentaries, debates and insights on the transformative role that IT and the IT industry have played, and continue to play, within India as well as globally. The book draws attention to issues and challenges that organizations grapple with in tech-enabled environments, and provides insights on the role of automation and computational techniques. It explores the global impact of the technology revolution on economic growth and development, electronic globalization, and the wider opportunities and challenges of a hi-tech world. The chapters cover various themes such as e-government in India, internet-based distribution systems, internet banking, and use of collaborative IT tools and functions to support virtual teams in the software industry and the business process outsourcing industry. Other chapters focus on methodological advances, such as systems thinking which finds applications in organizational decision-making, and the use of fuzzy logic. This volume will interest professionals and scholars of information technology and information systems, computer studies, IT systems, economics, and business and management studies.

Cybersecurity Analytics (Paperback): Rakesh M. Verma, David J Marchette Cybersecurity Analytics (Paperback)
Rakesh M. Verma, David J Marchette
R1,459 Discovery Miles 14 590 Ships in 12 - 17 working days

Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email detector, or just interested in finding patterns in your datasets? This book can let you do it on your own. Numerous examples and datasets links are included so that the reader can "learn by doing." Anyone with a basic college-level calculus course and some probability knowledge can easily understand most of the material. The book includes chapters containing: unsupervised learning, semi-supervised learning, supervised learning, text mining, natural language processing, and more. It also includes background on security, statistics, and linear algebra. The website for the book contains a listing of datasets, updates, and other resources for serious practitioners.

The Art of Attack - Attacker Mindset for Security Professionals (Paperback): M Reynolds The Art of Attack - Attacker Mindset for Security Professionals (Paperback)
M Reynolds
R543 Discovery Miles 5 430 Ships in 12 - 17 working days

Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. You'll discover: A variety of attacker strategies, including approaches, processes, reconnaissance, privilege escalation, redundant access, and escape techniques The unique tells and signs of an attack and how to avoid becoming a victim of one What the science of psychology tells us about amygdala hijacking and other tendencies that you need to protect against Perfect for red teams, social engineers, pentesters, and ethical hackers seeking to fortify and harden their systems and the systems of their clients, The Art of Attack is an invaluable resource for anyone in the technology security space seeking a one-stop resource that puts them in the mind of an attacker.

Securing Social Networks in Cyberspace (Hardcover): Al-Sakib Khan Pathan Securing Social Networks in Cyberspace (Hardcover)
Al-Sakib Khan Pathan
R2,811 Discovery Miles 28 110 Ships in 12 - 17 working days

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

HEALTHCARE's OUT SICK - PREDICTING A CURE - Solutions that WORK !!!! - Predictive Analytic Modeling, Decision Making,... HEALTHCARE's OUT SICK - PREDICTING A CURE - Solutions that WORK !!!! - Predictive Analytic Modeling, Decision Making, INNOVATIONS and Precision Medicine Necessary to Correct the Broken Healthcare Delivery System (Hardcover)
Gary D. Miner, Linda Miner, Darrell L. Dean
R857 Discovery Miles 8 570 Ships in 12 - 17 working days

The U.S. healthcare system is in "complete chaos-disarray." Medical costs have increased significantly over the past 6 years with 70% increase for deductibles and 24% or more for health insurance premiums. All the while, workers earnings have either not increased or if they did, the pay raises were for less than the increase in the cost of medical care. The situation is unsustainable and the public wants the system fixed. This book offers ways of fixing the problems in healthcare. HEALTHCARE's OUT SICK - PREDICTING A CURE - Solutions that WORK !!!! first defines the "healthcare in crisis" problem. Through real patient experiences, the book describes the difficulties of getting through the maze of complexity among the plethora of "silo providers" which make up the industry. The heart of the book provides readers with a comprehensive solution that can work, a disruption that is necessary to provide Americans the medical care they need without the US public and healthcare providers and payors going into bankruptcy, insolvency or closure. This book delves into digitized medicine, payor and provider reimbursement models, and value-based healthcare delivery. It also includes a philosophy or mode of thinking and operation for the solutions that are needed for diagnosis-effective, cost-effective, and time-efficient healthcare delivery, of which digitized medicine, value-based care, and payor reimbursement modes are just some of the factors. The authors propose that the real solution involves having the patient at the center of the issues and changing from an archaic gold standard way of thinking to a "Predictive Analytic thinking" where one gets at the real truth by doing "real science" that in the end becomes effective not only for the population but for the individual person. This all leads to real person-centered and person-directed medicine and healthcare delivery.

Transformation and Your New EHR - The Communications and Change Leadership Playbook for Implementing Electronic Health Records... Transformation and Your New EHR - The Communications and Change Leadership Playbook for Implementing Electronic Health Records (Hardcover)
Dennis R. Delisle, Andy McLamb, Samantha Inch
R1,358 Discovery Miles 13 580 Ships in 12 - 17 working days

Transformation and Your New EHR offers a robust communication and change leadership approach to support electronic health record (EHR) implementations and transformation journeys. This book highlights the approach and philosophy of communication, change leadership, and systems and process design, giving readers a practical view into the successes and failures that can be experienced throughout the evolution of an EHR implementation.

Privacy and Legal Issues in Cloud Computing (Hardcover): Anne S.Y. Cheung, Rolf H. Weber Privacy and Legal Issues in Cloud Computing (Hardcover)
Anne S.Y. Cheung, Rolf H. Weber
R3,547 Discovery Miles 35 470 Ships in 12 - 17 working days

Using a multi-disciplinary and comparative approach, this study examines emerging and innovative attempts to tackle privacy and legal issues in cloud computing such as personal data privacy, security and intellectual property protection. An international team of legal scholars, computer science researchers, regulators and practitioners present original and critical responses to the growing challenges posed by cloud computing. They analyze the specific legal implications pertaining to jurisdiction, biomedical practice and information ownership, as well as issues of regulatory control, competition and cross-border regulation. Law academics, practitioners and regulators will find this book to be a valuable, practical and accessible resource, as will computer science scholars interested in cloud computing issues. Contributors: H. Chang, A.S.Y. Cheung, A. Chiu, K.P. Chow, E.S. Dove, X. Fan, Y. Joly, T.S.-H. Kaan, B.M. Knoppers, J. Kong, G. Master, J.-P. Moiny, C. Reed, D.N. Staiger, G.Y. Tian, R.H. Weber, P.K. Yu

Large Deviations For Performance Analysis - Queues, Communication and Computing (Hardcover): Alan Weiss, Adam Shwartz Large Deviations For Performance Analysis - Queues, Communication and Computing (Hardcover)
Alan Weiss, Adam Shwartz
R4,492 Discovery Miles 44 920 Ships in 12 - 17 working days

Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.

Project Management Theory and Practice, Third Edition (Paperback, 3rd edition): Gary L. Richardson, Brad M. Jackson Project Management Theory and Practice, Third Edition (Paperback, 3rd edition)
Gary L. Richardson, Brad M. Jackson
R1,414 Discovery Miles 14 140 Ships in 9 - 15 working days

Project Management: Theory and Practice, Third Edition gives students a broad and real flavor of project management. Bringing project management to life, it avoids being too sterilely academic and too narrowly focused on a particular industry view. It takes a model-based approach towards project management commonly used in all industries. The textbook aligns with the latest version of the Project Management Institute's Project Management Body of Knowledge (PMBOK (R)) Guide, which is considered to be the de facto standard for project management. However, it avoids that standard's verbiage and presents students with readable and understandable explanations. Core chapters align with the Project Management Institute's model as well as explain how this model fits real-world projects. The textbook can be used as companion to the standard technical model and help those studying for various project management certifications. The textbook takes an in-depth look at the following areas important to the standard model: Work Breakdown Structures (WBS) Earned Value Management (EVM) Enterprise project management Portfolio management (PPM) Professional responsibility and ethics Agile life cycle The text begins with a background section (Chapters 1-9) containing material outside of the standard model structure but necessary to prepare students for the 10 standard model knowledge areas covered in the chapters that follow. The text is rounded out by eight concluding chapters that explain advanced planning approaches models and projects' external environments. Recognizing that project management is an evolving field, the textbook includes section written by industry experts who share their insight and expertise on cutting-edge topics. It prepares students for upcoming trends and changes in project management while providing an overview of the project management environment today. In addition to guiding students through current models and standards, Project Management: Theory and Practice, Third Edition prepares students for the future by stimulating their thinking beyond the accepted pragmatic view.

The Culture of AI - Everyday Life and the Digital Revolution (Hardcover): Anthony Elliott The Culture of AI - Everyday Life and the Digital Revolution (Hardcover)
Anthony Elliott
R4,139 Discovery Miles 41 390 Ships in 12 - 17 working days

In this ground-breaking book, Cambridge-trained sociologist Anthony Elliott argues that much of what passes for conventional wisdom about artificial intelligence is either ill-considered or plain wrong. The reason? The AI revolution is not so much about cyborgs and super-robots in the future, but rather massive changes in the here-and-now of everyday life. In The Culture of AI, Elliott explores how intelligent machines, advanced robotics, accelerating automation, big data and the Internet of Everything impact upon day-to-day life and contemporary societies. With remarkable clarity and insight, Elliott's examination of the reordering of everyday life highlights the centrality of AI to everything we do - from receiving Amazon recommendations to requesting Uber, and from getting information from virtual personal assistants to talking with chatbots. The rise of intelligent machines transforms the global economy and threatens jobs, but equally there are other major challenges to contemporary societies - although these challenges are unfolding in complex and uneven ways across the globe. The Culture of AI explores technological innovations from industrial robots to softbots, and from self-driving cars to military drones - and along the way provides detailed treatments of: The history of AI and the advent of the digital universe; automated technology, jobs and employment; the self and private life in times of accelerating machine intelligence; AI and new forms of social interaction; automated vehicles and new warfare; and, the future of AI. Written by one of the world's foremost social theorists, The Culture of AI is a major contribution to the field and a provocative reflection on one of the most urgent issues of our time. It will be essential reading to those working in a wide variety of disciplines including sociology, science and technology studies, politics, and cultural studies.

Cyber Security Innovation for the Digital Economy - A Case Study of the Russian Federation (Hardcover): Sergei Petrenko Cyber Security Innovation for the Digital Economy - A Case Study of the Russian Federation (Hardcover)
Sergei Petrenko
R2,635 Discovery Miles 26 350 Ships in 12 - 17 working days

Cyber Security Innovation for the Digital Economy considers possible solutions to the relatively new scientific-technical problem of developing innovative solutions in the field of cyber security for the Digital Economy. The solutions proposed are based on the results of exploratory studies conducted by the author in the areas of Big Data acquisition, cognitive information technologies (cogno-technologies), new methods of analytical verification of digital ecosystems on the basis of similarity invariants and dimensions, and "computational cognitivism," involving a number of existing models and methods. In practice, this successfully allowed the creation of new entities - the required safe and trusted digital ecosystems - on the basis of the development of digital and cyber security technologies, and the resulting changes in their behavioral preferences. Here, the ecosystem is understood as a certain system of organizations, created around a certain Technological Platform that use its services to make the best offers to customers and access to them to meet the ultimate needs of clients - legal entities and individuals. The basis of such ecosystems is a certain technological platform, created on advanced innovative developments, including the open interfaces and code, machine learning, cloud technologies, Big Data collection and processing, artificial intelligence technologies, etc. The mentioned Technological Platform allows creating the best offer for the client both from own goods and services and from the offers of external service providers in real time. This book contains four chapters devoted to the following subjects: - Relevance of the given scientific-technical problems in the cybersecurity of Digital Economy - Determination of the limiting capabilities - Possible scientific and technical solutions - Organization of perspective research studies in the area of Digital Economy cyber security in Russia

Implementing the Project Management Balanced Scorecard (Paperback): Jessica Keyes Implementing the Project Management Balanced Scorecard (Paperback)
Jessica Keyes
R1,921 Discovery Miles 19 210 Ships in 12 - 17 working days

Business managers have long known the power of the Balanced Scorecard in executing corporate strategy. Implementing the Project Management Balanced Scorecard shows project managers how they too can use this framework to meet strategic objectives. It supplies valuable insight into the project management process as a whole and provides detailed explanations on how to effectively implement the balanced scorecard to measure and manage performance and projects. The book details a tactical approach for implementing the scorecard approach at the project level and investigates numerous sample scorecards, metrics, and techniques. It examines recent research on critical issues such as performance measurement and management, continuous process improvement, benchmarking, metrics selection, and people management. It also explains how to integrate these issues with the four perspectives of the balanced scorecard: customer, business processes, learning and innovation, and financial. Filled with examples and case histories, the book directly relates the scorecard concept to the major project management steps of determining scope, scheduling, estimation, risk management, procurement, and project termination. It includes a plethora of resources on the accompanying downloadable resources-including detailed instructions for developing a measurement program, a full metrics guide, a sample project plan, and a set of project management fill-in forms.

Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints (Hardcover): Jinling Liang, Zidong Wang, Fan... Recursive Filtering for 2-D Shift-Varying Systems with Communication Constraints (Hardcover)
Jinling Liang, Zidong Wang, Fan Wang
R3,997 Discovery Miles 39 970 Ships in 12 - 17 working days

This book presents up-to-date research developments and novel methodologies regarding recursive filtering for 2-D shift-varying systems with various communication constraints. It investigates recursive filter/estimator design and performance analysis by a combination of intensive stochastic analysis, recursive Riccati-like equations, variance-constrained approach, and mathematical induction. Each chapter considers dynamics of the system, subtle design of filter gains, and effects of the communication constraints on filtering performance. Effectiveness of the derived theories and applicability of the developed filtering strategies are illustrated via simulation examples and practical insight. Features:- Covers recent advances of recursive filtering for 2-D shift-varying systems subjected to communication constraints from the engineering perspective. Includes the recursive filter design, resilience operation and performance analysis for the considered 2-D shift-varying systems. Captures the essence of the design for 2-D recursive filters. Develops a series of latest results about the robust Kalman filtering and protocol-based filtering. Analyzes recursive filter design and filtering performance for the considered systems. This book aims at graduate students and researchers in mechanical engineering, industrial engineering, communications networks, applied mathematics, robotics and control systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,271 Discovery Miles 12 710
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R635 Discovery Miles 6 350
The Gathering Cloud
J. R. Carpenter Paperback R385 Discovery Miles 3 850
CSSLP Certified Secure Software…
Wm. Arthur Conklin, Daniel Shoemaker Paperback R1,151 Discovery Miles 11 510
Quantum Computing For Dummies
William Hurley, Floyd Earl Smith Paperback R567 Discovery Miles 5 670

 

Partners