0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (275)
  • R250 - R500 (877)
  • R500+ (13,585)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Pro Open Source Mail - Building an Enterprise Mail Solution (Hardcover, 1st ed.): Curtis Smith Pro Open Source Mail - Building an Enterprise Mail Solution (Hardcover, 1st ed.)
Curtis Smith
R1,511 Discovery Miles 15 110 Ships in 18 - 22 working days

Providing the range of mail-related services expected by organizations can be a confusing, daunting process. "Pro Open Source Mail: Building an Enterprise Mail Solution" presents a comprehensive guide to managing the most important e-mail services, including user administration, mail transfer agents, remote e-mail access, virus protection, spam and e-mail filtering, web-based e-mail, and mailing list maintenance.

Beginning with installation and configuration of the popular server-based operating system Fedora Core, the book outlines the system and network preparation process geared towards running a complete enterprise e-mail system. Subsequent chapters cover installation and configuration of sendmail, the popular POP3/IMAP server Dovecot, and ClamAV and SpamAssassin for virus protection and spam filtering. With a nod to the global e-mail availability now required by many organizations, this book also guides you through configuration of a web-based mail interface, mailing-list software, and advanced security and privacy topics.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R2,801 Discovery Miles 28 010 Ships in 18 - 22 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

Biometric Authentication in Online Learning Environments (Hardcover): A.V. Senthil Kumar Biometric Authentication in Online Learning Environments (Hardcover)
A.V. Senthil Kumar
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

Student assessment in online learning is submitted remotely without any face-to-face interaction, and therefore, student authentication is widely seen as one of the major challenges in online examination. Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, especially within education, the need for authentication has increased. Biometric Authentication in Online Learning Environments provides innovative insights into biometrics as a strategy to mitigate risk and provide authentication, while introducing a framework that provides security to improve e-learning and on-line examination by utilizing biometric-based authentication techniques. This book examines e-learning, security, threats in online exams, security considerations, and biometric technologies, and is designed for IT professionals, higher education administrators, professors, researchers, business professionals, academicians, and libraries seeking topics centered on biometrics as an authentication strategy within educational environments.

Network Processors - Architecture, Programming, and Implementation (Hardcover): Ran Giladi Network Processors - Architecture, Programming, and Implementation (Hardcover)
Ran Giladi
R2,027 Discovery Miles 20 270 Ships in 10 - 15 working days

Network processors are the basic building blocks of today's high-speed, high-demand, quality-oriented communication networks. Designing and implementing network processors requires a new programming paradigm and an in-depth understanding of network processing requirements. This book leads the reader through the requirements and the underlying theory of networks, network processing, and network processors. It covers implementation of network processors and intergrates EZchip Microcode Development Environment so that you can gain hands-on experience in writing high-speed networking applications. By the end of the book, the reader will be able to write and test applications on a simulated network processor.
Comprehensive, theoretical, and pracitical coverage of networks and high-speed networking applicationsDescirbes contemporary core, metro, and access networks and their processing algorithmsCovers network processor architectures and programming models, enabling readers to assess the optimal network processor typer and configuration for their applicationFree download from http: //www.cse.bgu.ac.il/npbook includes microcode development tools that provide hands-on experience with programming a network processor

Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure... Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure (Paperback)
Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson Jr., …
R1,361 Discovery Miles 13 610 Ships in 10 - 15 working days

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field

WDMA Optical Networks (Hardcover): Andrea Borella, G. Cancellieri, F. Chiaraluce WDMA Optical Networks (Hardcover)
Andrea Borella, G. Cancellieri, F. Chiaraluce
R3,494 Discovery Miles 34 940 Ships in 18 - 22 working days

Strengthen your understanding of fast-moving WDMA optical network technology, and learn how to better select and design reliable all-optical telecom networks with this practical book. It will help expand your knowledge of LLN, Manhattan, Shuffle, De Bruijn, Gemmet, Matrix, Swift, and Starnet and will show you how to employ an effective method of network organization based on traffic demands.

Introduction to Modern Sleep Technology (Hardcover, 2012 ed.): Rayleigh Ping-Ying Chiang, Shih-Chun Kang Introduction to Modern Sleep Technology (Hardcover, 2012 ed.)
Rayleigh Ping-Ying Chiang, Shih-Chun Kang
R2,692 Discovery Miles 26 920 Ships in 18 - 22 working days

Sleep medicine has been developing for more than 40 years. The current concepts in sleep technology are mainly centered on polysomnography (PSG) and issues related to sleep technicians. However, the editorsbelieve that the true value of technology is revealed only when benefits to humanity are manifest. To this end, they endeavor to create a new era in sleep technology, one that will improve the quality of people's sleep and daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Securing Citrix XenApp Server in the Enterprise (Paperback): Tariq Azad Securing Citrix XenApp Server in the Enterprise (Paperback)
Tariq Azad
R1,318 Discovery Miles 13 180 Ships in 10 - 15 working days

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server.
All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp," said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.
* The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server.
* Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers.
* Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

Microsoft Exchange Server 2007 with SP1 - Tony Redmond's Guide to Successful Implementation (Paperback): Tony Redmond Microsoft Exchange Server 2007 with SP1 - Tony Redmond's Guide to Successful Implementation (Paperback)
Tony Redmond
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality.
Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:
*install enabling on Windows Server 2008
*IVp6 support
*Unified Messaging inclusion
*EMC enhancements
*Client Access Improvements for Outlook Web Access and Activesync
*New user interfaces for POP3 and IMAP4
*System resource monitoring and message routing improvements
*New features for the mailbox server role
*.pst file data managment improvements
*new high-availability features
*optimization for mobile access
*and much more
*Complete coverage of all the updates in SP1 ensure admins skip the initial 2007 release's bugs and upgrade with ease
*Written by HP Services CTO Tony Redmond, the world's most trusted author of Exchange books for over a decade
*250+ pages of updates throughout, including totally new sections on Windows 2008 compatibility, Microsoft Yona, Windows Mobile 6 and 6.1 devices, Apple iPhone, and more

Network Security: Know It All (Hardcover): James Joshi Network Security: Know It All (Hardcover)
James Joshi
R1,626 Discovery Miles 16 260 Ships in 10 - 15 working days

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.
* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise.
* Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
* Examples illustrate core security concepts for enhanced comprehension

The Best Damn Firewall Book Period (Paperback, 2nd edition): Thomas W. Shinder The Best Damn Firewall Book Period (Paperback, 2nd edition)
Thomas W. Shinder
R1,302 Discovery Miles 13 020 Ships in 10 - 15 working days

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit.
Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around firewalls, and analyzing security log files.
Sections are organized by major vendor, and include hardware, software and VPN configurations for each product line.
New to this Edition:
* Microsoft firewall protection, from Windows Firewall to ISA Server 2006
* Cisco PIX Version 7, including VPN configuration and IDS
* Analyzing Firewall Logs and Reports
* VoIP and Firewall Bypassing

Trustworthy Ubiquitous Computing (English, Bosnian, Hardcover, 2012 ed.): Ismail Khalil, Teddy Mantoro Trustworthy Ubiquitous Computing (English, Bosnian, Hardcover, 2012 ed.)
Ismail Khalil, Teddy Mantoro
R1,434 Discovery Miles 14 340 Ships in 18 - 22 working days

Trustworthy Ubiquitous Computing covers aspects of trust in ubiquitous computing environments. The aspects of context, privacy, reliability, usability and user experience related to "emerged and exciting new computing paradigm of Ubiquitous Computing", includes pervasive, grid, and peer-to-peer computing including sensor networks to provide secure computing and communication services at anytime and anywhere. Marc Weiser presented his vision of disappearing and ubiquitous computing more than 15 years ago. The big picture of the computer introduced into our environment was a big innovation and the starting point for various areas of research. In order to totally adopt the idea of ubiquitous computing several houses were build, equipped with technology and used as laboratory in order to find and test appliances that are useful and could be made available in our everyday life. Within the last years industry picked up the idea of integrating ubiquitous computing and already available products like remote controls for your house were developed and brought to the market. In spite of many applications and projects in the area of ubiquitous and pervasive computing the success is still far away. One of the main reasons is the lack of acceptance of and confidence in this technology. Although researchers and industry are working in all of these areas a forum to elaborate security, reliability and privacy issues, that resolve in trustworthy interfaces and computing environments for people interacting within these ubiquitous environments is important. The user experience factor of trust thus becomes a crucial issue for the success of a UbiComp application. The goal of this book is to provide a state the art of Trustworthy Ubiquitous Computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues.

Nagios 3 Enterprise Network Monitoring - Including Plug-Ins and Hardware Devices (Paperback): Max Schubert, Derrick Bennett,... Nagios 3 Enterprise Network Monitoring - Including Plug-Ins and Hardware Devices (Paperback)
Max Schubert, Derrick Bennett, Jonathan Gines, Andrew Hay, John Strand
R1,069 Discovery Miles 10 690 Ships in 10 - 15 working days

The future for Nagios in the enterprise is certainly bright! "Nagios 3 Enterprise Network Monitoring" can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more.
* Complete Case Study Demonstrates how to Deploy Nagios Globally in an Enterprise Network
* Monitor Third Party Hardware Devices with Nagios

An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure... An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks - Critical Information Infrastructure Protection (Hardcover, 2012)
S.V. Raghavan, E. Dawson
R2,699 Discovery Miles 26 990 Ships in 18 - 22 working days

Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred to as Cyber Space. In this monograph, we capture FIVE different aspects of the problem; High speed packet capture, Protection through authentication, Technology Transition, Test Bed Simulation, and Policy and Legal Environment. The monograph is the outcome of over three years of cooperation between India and Australia.

MPLS: Next Steps, Volume 1 (Hardcover): Bruce S. Davie, Adrian Farrel MPLS: Next Steps, Volume 1 (Hardcover)
Bruce S. Davie, Adrian Farrel
R1,682 Discovery Miles 16 820 Ships in 10 - 15 working days

SHORT DESCRIPTION:
Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has resulted in the abandoning of some of the original features of MPLS, and the development of other new features. MPLS has moved from a prospective solution, to a grown-up technology. Now that MPLS has reached this level of maturity, these new tools and features allow more sophisticated services to the users of the network. These tools and features are discussed within various contexts throughout several networking-related books published by MK and this presents us with a unique publishing opportunity.
The proposed book is a best-of-the-best collection of existing content from several books MK has published in recent years on MPLS technology (multi-label protocol switching). Individual chapters on MPLS technology are derived from a handful of MK books and are combined in one new volume in a way that makes sense as a reference work for those interested in new and developing aspects of this technology, i.e., network operators and designers who need to determine which aspects of their networks would benefit from MPLS technology and applications. It also serves as a definitive reference for engineers implementing MPLS-based products.
This book represents a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources. Suitable and current content will be collected from the following titles: Evans, Deploying IP and MPLS QoS (2006); Farrel, GMPLS (2005); Ash, Traffic Engineering (2006); Vasseur, Network Recovery (2005); Farrel, The Internet and Its Protocols (2004); Nadeau, MPLS Management (2003); and Davie, MPLS Technology and Applications (2000). These chapters will be updated where necessary and two new chapters will be added at the beginning and the end of the book to bring the content into focus and discuss next generation developments.

* Coverage of major applications of MPLS such as traffic engineering, VPNs, IP integration, GMPLS, and QoS written by leading experts in the field contributes to your practical knowledge of this key technology
* Shows you how to implement various MPLS applications that will result in saving your organization time and money
* Shows you how you can evaluate MPLS applications and techniques in relation to one another so you can develop an optimum network design

Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019): Aboul... Cybersecurity and Secure Information Systems - Challenges and Solutions in Smart Environments (Hardcover, 1st ed. 2019)
Aboul Ella Hassanien, Mohamed Elhoseny
R3,821 Discovery Miles 38 210 Ships in 18 - 22 working days

This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.

Wireless Networking (Hardcover): Anurag Kumar, D Manjunath, Joy Kuri Wireless Networking (Hardcover)
Anurag Kumar, D Manjunath, Joy Kuri
R1,820 Discovery Miles 18 200 Ships in 10 - 15 working days

Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous "WiFi" networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field.
*Goes beyond descriptive and qualitative treatments, by presenting the foundations underlying the various wireless networking technologies
*Provides abstractions, models and analyses of established and emerging wireless networks, thereby supplying the reader with a conceptual and quantitative treatment, thus ensuring longevity of the learning from this material
*Aids comprehension by including over 120 figures, four appendices on the mathematics of the various models, several inline exercises, and extensive problem sets at the end of each chapter

Novel Practices and Trends in Grid and Cloud Computing (Hardcover): Pethuru Raj, S Koteeswaran Novel Practices and Trends in Grid and Cloud Computing (Hardcover)
Pethuru Raj, S Koteeswaran
R6,346 Discovery Miles 63 460 Ships in 18 - 22 working days

Business and IT organizations are currently embracing new strategically sound concepts in order to be more customer-centric, competitive, and cognitive in their daily operations. While useful, the various software tools, pioneering technologies, as well as their unique contributions largely go unused due to the lack of information provided on their special characteristics. Novel Practices and Trends in Grid and Cloud Computing is a collection of innovative research on the key concerns of cloud computing and how they are being addressed, as well as the various technologies and tools empowering cloud theory to be participative, penetrative, pervasive, and persuasive. While highlighting topics including cyber security, smart technology, and artificial intelligence, this book is ideally designed for students, researchers, and business managers on the lookout for innovative IT solutions for all the business automation software and improvisations of computational technologies.

Digital Design (VHDL) - An Embedded Systems Approach Using VHDL (Paperback): Peter J Ashenden Digital Design (VHDL) - An Embedded Systems Approach Using VHDL (Paperback)
Peter J Ashenden
R2,158 Discovery Miles 21 580 Ships in 10 - 15 working days

"Digital Design: An Embedded Systems Approach Using VHDL" provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It takes an up-to-date and modern approach of presenting digital logic design as an activity in a larger systems design context.
Rather than focus on aspects of digital design that have little relevance in a realistic design context, this book concentrates on modern and evolving knowledge and design skills. Hardware description language (HDL)-based design and verification is emphasized--VHDL examples are used extensively throughout. By treating digital logic as part of embedded systems design, this book provides an understanding of the hardware needed in the analysis and design of systems comprising both hardware and software components.
Includes a Web site with links to vendor tools, labs and tutorials.
Presents digital logic design as an activity in a larger systems design context.
Features extensive use of VHDL examples to demonstrate HDL (hardware description language) usage at the abstract behavioural level and register transfer level, as well as for low-level verification and verification environments.
Includes worked examples throughout to enhance the reader's understanding and retention of the material.
Companion Web site includes links to tools for FPGA design from Synplicity, Mentor Graphics, and Xilinx, VHDL source code for all the examples in the book, lecture slides, laboratory projects, and solutions to exercises."

Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback): Constantine Photopoulos Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback)
Constantine Photopoulos
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.
*Addresses a very topical subject of great concern to security, general IT and business management
*Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data.
*Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues

Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E... Towards Sustainable Society on Ubiquitous Networks - The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24 - 26, 2008, Tokyo, Japan (Hardcover, 2008 ed.)
Makoto Oya, Ryuya Uda, Chizuko Yasunobu
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation [2]. For example, Amazon. com is a good example of the success of - commender systems [1]. Over the past several years, a considerable amount of research has been conducted on recommendation systems. In general, the usefulness of the recommendation is measured based on its accuracy [3]. Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar items will be recommended. Several studies have reported that users might not be satisfied with a recommendation even though it exhibits high recommendation accuracy [4]. For this reason, we consider that a recommendation having only accuracy is - satisfactory. The serendipity of a recommendation is an important element when c- sidering a user's long-term profits. A recommendation that brings serendipity to users would solve the problem of "user weariness" and would lead to exploitation of users' tastes. The viewpoint of the diversity of the recommendation as well as its accuracy should be required for future recommender systems.

Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca,... Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 (Hardcover, 2008 ed.)
Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This volume contains the proceedings of the Seventh Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net'2008), celebrated in Palma de Mallorca (llles Balears, Spain) during June 25-27, 2008. This IFIP TC6 Workshop was organized by the Universitat de les Illes Balears in cooperation with the Asociaci6n de Tdcnicos de lnform tica and sponsored by the following Working Groups: WG6.3 (Performance of Computer Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. Aside the adoption of Internet as the global network infrastructure these last years have shown the growing of a set of new network architectures without a rigid and known a priori architecture using wireless techniques, like sensor and ad-hoc networks. These new types of networks are opening the possibility to create a large number of new applications ranging from domestic to nature surveying. These new networks are generating new technical challenges like the capability of auto-reconfiguration in order to give the network an optimal configuration, the energy saving need when the nodes have not a source of energy other than a small battery, new protocols to access the network and to convey the information across the network when its structure is not completely known or should be discovered, new paradigms for keeping the needed information security and privacy in a quite uncontrolled environment, and others.

Nmap in the Enterprise - Your Guide to Network Scanning (Paperback): Angela Orebaugh, Becky Pinkard Nmap in the Enterprise - Your Guide to Network Scanning (Paperback)
Angela Orebaugh, Becky Pinkard
R1,264 Discovery Miles 12 640 Ships in 10 - 15 working days

Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking for live hosts, specific services, or specific operating systems. Part of the beauty of Nmap is its ability to create IP packets from scratch and send them out utilizing unique methodologies to perform the above-mentioned types of scans and more. This book provides comprehensive coverage of all Nmap features, including detailed, real-world case studies.
-Understand Network Scanning
Master networking and protocol fundamentals, network scanning techniques, common network scanning tools, along with network scanning and policies.
-Get Inside Nmap
Use Nmap in the enterprise, secure Nmap, optimize Nmap, and master advanced Nmap scanning techniques.
-Install, Configure, and Optimize Nmap
Deploy Nmap on Windows, Linux, Mac OS X, and install from source.
-Take Control of Nmap with the Zenmap GUI
Run Zenmap, manage Zenmap scans, build commands with the Zenmap command wizard, manage Zenmap profiles, and manage Zenmap results.
-Run Nmap in the Enterprise
Start Nmap scanning, discover hosts, port scan, detecting operating systems, and detect service and application versions
-Raise those Fingerprints
Understand the mechanics of Nmap OS fingerprinting, Nmap OS fingerprint scan as an administrative tool, and detect and evade the OS fingerprint scan.
-"Tool" around with Nmap
Learn about Nmap add-on and helper tools: NDiff--Nmap diff, RNmap--Remote Nmap, Bilbo, Nmap-parser.
-Analyze Real-WorldNmap Scans
Follow along with the authors to analyze real-world Nmap scans.
-Master Advanced Nmap Scanning Techniques
Torque Nmap for TCP scan flags customization, packet fragmentation, IP and MAC address spoofing, adding decoy scan source IP addresses, add random data to sent packets, manipulate time-to-live fields, and send packets with bogus TCP or UDP checksums.

Software Defined Networks - A Comprehensive Approach (Paperback): Paul Goransson, Chuck Black Software Defined Networks - A Comprehensive Approach (Paperback)
Paul Goransson, Chuck Black
R1,041 Discovery Miles 10 410 Ships in 10 - 15 working days

"Software Defined Networks" discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN modelHow to make intelligent decisions about when to integrate SDN technologies in a networkHow to decide if your organization should be developing its own SDN applications or looking to acquire these from an outside vendorHow to accelerate the ability to develop your own SDN application, be it entirely novel or a more efficient approach to a long-standing problem
Discusses the evolution of the switch platforms that enable SDN Addresses when to integrate SDN technologies in a networkProvides an overview of sample SDN applications relevant to different industriesIncludes practical examples of how to write SDN applications

Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.): Joyce... Probing Experience - From Assessment of User Emotions and Behaviour to Development of Products (Hardcover, 2008 ed.)
Joyce Westerink, Martin Ouwerkerk, Therese J. M. Overbeek, W. Frank Pasveer
R2,673 Discovery Miles 26 730 Ships in 18 - 22 working days

This book adheres to the vision that in the future compelling user experiences will be key differentiating benefits of products and services. Evaluating the user experience plays a central role, not only during the design process, but also during regular usage: for instance a video recorder that recommends TV programs that fit your current mood, a product that measures your current level of relaxation and produces advice on how to balance your life, or a module that alerts a factory operator when he is getting drowsy. Such systems are required to assess and interpret user experiences (almost) in real-time, and that is exactly what this book is about. How to achieve this? What are potential applications of psychophysiological measurements? Are real-time assessments based on monitoring of user behavior possible? If so, which elements are critical? Are behavioral aspects important? Which technology can be used? How important are intra-individual differences? What can we learn from products already on the market? The book gathers a group of invited authors from different backgrounds, such as technology, academy and business. This is a mosaic of their work, and that of Philips Research, in the assessment of user experience, covering the full range from academic research to commercial propositions..

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Joseph Babinski - A Biography
Jacques MD Philippon, Jacques MD Poirier Hardcover R1,826 Discovery Miles 18 260
A Life of Ernest Starling
John Henderson Hardcover R1,064 Discovery Miles 10 640
War Doctor - Surgery On The Front Line
David Nott Paperback  (1)
R299 R271 Discovery Miles 2 710
Before We Went Wireless - David Edward…
Ivor Hughes, David Evans Paperback R883 Discovery Miles 8 830
Chasing The Internet - From Backyards To…
Alan Knott-Craig Paperback R300 R220 Discovery Miles 2 200
Why Fish Don't Exist
Lulu Miller Paperback R446 R362 Discovery Miles 3 620
War Doctor - Surgery on the Front Line
David Nott Paperback  (1)
R503 R406 Discovery Miles 4 060
The Thinking Machine - Jensen Huang…
Stephen Witt Paperback R440 R393 Discovery Miles 3 930
Presidential Spirit - The True Story of…
Gina S Scheff Paperback R363 R340 Discovery Miles 3 400
Koos Bekker's Billions
T J Strydom Paperback R325 Discovery Miles 3 250

 

Partners