0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (322)
  • R250 - R500 (923)
  • R500+ (16,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Uncoded Multimedia Transmission (Hardcover): Feng Wu, Chong Luo, Hancheng Lu Uncoded Multimedia Transmission (Hardcover)
Feng Wu, Chong Luo, Hancheng Lu
R3,546 Discovery Miles 35 460 Ships in 12 - 17 working days

An uncoded multimedia transmission (UMT) system is one that skips quantization and entropy coding in compression and all subsequent binary operations, including channel coding and bit-to-symbol mapping of modulation. By directly transmitting non-binary symbols with amplitude modulation, the uncoded system avoids the annoying cliff effect observed in the coded transmission system. This advantage makes uncoded transmission more suited to both unicast in varying channel conditions and multicast to heterogeneous users. Particularly, in the first part of Uncoded Multimedia Transmission, we consider how to improve the efficiency of uncoded transmission and make it on par with coded transmission. We then address issues and challenges regarding how to better utilize temporal and spatial correlation of images and video in the uncoded transmission, to achieve the optimal transmission performance. Next, we investigate the resource allocation problem for uncoded transmission, including subchannel, bandwidth and power allocation. By properly allocating these resources, uncoded transmission can achieve higher efficiency and more robust performance. Subsequently, we consider the image and video delivery in MIMO broadcasting networks with diverse channel quality and varying numbers of antennas across receivers. Finally, we investigate the cases where uncoded transmission can be used in conjunction with digital transmission for a balanced efficiency and adaptation capability. This book is the very first monograph in the general area of uncoded multimedia transmission written in a self-contained format. It addresses both the fundamentals and the applications of uncoded transmission. It gives a systematic introduction to the fundamental theory and concepts in this field, and at the same time, also presents specific applications that reveal the great potential and impacts for the technologies generated from the research in this field. By concentrating several important studies and developments currently taking place in the field of uncoded transmission in a single source, this book can reduce the time and cost required to learn and improve skills and knowledge in the field. The authors have been actively working in this field for years, and this book is the final essence of their years of long research in this field. The book may be used as a collection of research notes for researchers in this field, a reference book for practitioners or engineers, as well as a textbook for a graduate advanced seminar in this field or any related fields. The references collected in this book may be used as further reading lists or references for the readers.

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Paperback, 8th Edition): Mike Chapple,... (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Paperback, 8th Edition)
Mike Chapple, James Michael. Stewart, Darril Gibson
R1,761 R1,619 Discovery Miles 16 190 Save R142 (8%) Ships in 9 - 15 working days

NOTE: The CISSP objectives this book covered were issued in 2018. For coverage of the most recent CISSP objectives effective in April 2021, please look for the latest edition of this guide: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition (ISBN: 9781119786238). CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Six unique 150 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 700 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Optical Modulation - Advanced Techniques and Applications in Transmission Systems and Networks (Hardcover): Le Nguyen Binh Optical Modulation - Advanced Techniques and Applications in Transmission Systems and Networks (Hardcover)
Le Nguyen Binh
R5,551 Discovery Miles 55 510 Ships in 12 - 17 working days

This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system. New digital techqniues such as chromatic dispersion, polarization mode dispersion, nonlinear phase distortion effects, etc. will be discussed. Practical models for practice and understanding the behavior and dynamics of the devices and systems will be included.

Windows NT in a Nutshell (Paperback): Eric Pearce Windows NT in a Nutshell (Paperback)
Eric Pearce 1
R625 R452 Discovery Miles 4 520 Save R173 (28%) Out of stock

This book organizes NT's complex 4.0 GUI interface, dialog boxes, and multitude of DOS-shell commands into an easy-to-use quick reference for anyone who uses or manages an NT system. It features a new tagged callout approach to documenting the 4.0 GUI and real-life examples of command usage and strategies for problem solving, with an emphasis on networking. Addresses the single-system home user as well as the administrator of a 1,000-node corporate network.

Networking For Dummies, 12th Edition (Paperback, 12th Edition): D. Lowe Networking For Dummies, 12th Edition (Paperback, 12th Edition)
D. Lowe
R656 Discovery Miles 6 560 Ships in 12 - 17 working days

Set up a secure network at home or the office Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you'll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more. From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data--this #1 bestselling guide covers it all. Build a wired or wireless network Secure and optimize your network Set up a server and manage Windows user accounts Use the cloud--safely Written by a seasoned technology author--and jam-packed with tons of helpful step-by-step instructions--this is the book network administrators and everyday computer users will turn to again and again.

Information Technology and Organizational Learning - Managing Behavioral Change in the Digital Age (Paperback, 3rd edition):... Information Technology and Organizational Learning - Managing Behavioral Change in the Digital Age (Paperback, 3rd edition)
Arthur M. Langer
R2,353 Discovery Miles 23 530 Ships in 12 - 17 working days

Focusing on the critical role IT plays in organizational development, the book shows how to employ action learning to improve the competitiveness of an organization. Defining the current IT problem from an operational and strategic perspective, it presents a collection of case studies that illustrate key learning issues. It details a dynamic model for effective IT management through adaptive learning techniques-supplying proven educational theories and practices to foster the required changes in your staff. It examines existing organizational learning theories and the historical problems that occurred with companies that have used them, as well as those that have failed to use them.

Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2020 International Workshops, DPM 2020 and CBT... Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Jordi Herrera Joancomarti
R1,367 Discovery Miles 13 670 Ships in 12 - 17 working days

This book constitutes the revised selected post conference proceedings of the 15th International Workshop on Data Privacy Management, DPM 2020, and the 4th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2020, held in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020, held in Guildford, UK in September 2020.For the CBT Workshop 8 full and 4 short papers were accepted out of 24 submissions. The selected papers are organized in the following topical headings: Transactions, Mining, Second Layer and Inter-bank Payments. The DPM Workshop received 38 submissions from which 12 full and 5 short papers were selected for presentation. The papers focus on Second Layer, Signature Schemes, Formal Methods, Privacy, SNARKs and Anonymity.

IP Routing Protocols - Two-Volume Set (Paperback): James Aweya IP Routing Protocols - Two-Volume Set (Paperback)
James Aweya
R2,865 Discovery Miles 28 650 Ships in 12 - 17 working days

This two-volume book describes the most common IP routing protocols used today, explaining the underlying concepts of each protocol and how the protocol components and processes fit within the typical router. Unlike other books, this title is not vendor focused. Volume 1 discusses fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Volume 2 focuses on link-state routing protocols (OSPF and IS-IS) and the only path-vector routing protocol in use today (BGP). The volumes explain the types of databases each routing protocol uses, how the databases are constructed and managed, and how the various protocol components and processes, relate and interact with the databases. They also describe the routing protocols from a systems perspective, recognizing the most important routing and packet forwarding components and functions of a router. An illustrated description of IP routing protocols is given using real-world network examples. The books are presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers.

IP Routing Protocols - Two-Volume Set (Hardcover): James Aweya IP Routing Protocols - Two-Volume Set (Hardcover)
James Aweya
R7,077 Discovery Miles 70 770 Ships in 12 - 17 working days

This two-volume book describes the most common IP routing protocols used today, explaining the underlying concepts of each protocol and how the protocol components and processes fit within the typical router. Unlike other books, this title is not vendor focused. Volume 1 discusses fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Volume 2 focuses on link-state routing protocols (OSPF and IS-IS) and the only path-vector routing protocol in use today (BGP). The volumes explain the types of databases each routing protocol uses, how the databases are constructed and managed, and how the various protocol components and processes, relate and interact with the databases. They also describe the routing protocols from a systems perspective, recognizing the most important routing and packet forwarding components and functions of a router. An illustrated description of IP routing protocols is given using real-world network examples. The books are presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers.

Advanced Geoinformation Science (Paperback): Chaowei Yang, David Wong, Qianjun Miao, Ruixin Yang Advanced Geoinformation Science (Paperback)
Chaowei Yang, David Wong, Qianjun Miao, Ruixin Yang
R2,376 Discovery Miles 23 760 Ships in 12 - 17 working days

Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses. With pioneering editors and expert contributors, Advanced Geoinformation Science explores how certain technical aspects of geoinformation have been used and could be used to address such global issues. The editors and chapter authors have been involved in global initiatives such as Global Earth Observation System of Systems (GEOSS) and Digital Earth, and research problems such as air quality, public health, and cloud computing. The book delineates the problems communities are likely to face and how advanced geoinformation science can be a part of their solution. It introduces different methods in collecting spatial data as the initial feeds to geoinformation science and computing platforms. It discusses systems for data management, data integration and analysis, the geoinformation infrastructure, as well as knowledge capture, formatting, and utilization. The book then explores a variety of geoinformation applications, highlighting environmental, agriculture, and urban planning uses. Geoinformation science encompasses more than just traditional technologies such as Remote Sensing, GIS, GPS, and supporting disciplines. And although the science continues to become more multidisciplinary, the literature remains compartmentalized according to the traditional disciplinary boundaries. Capturing recent developments in geoinformation science and linking IT with a wide range of Earth sciences, the authors explain how advanced technology and concepts play a significant role in recent advancements. Enhanced with forty-four color illustrations, live examples such as GOS and AirNow, and insights from NASA, EPA, and USGS, the book provides a vision for the future and explores how to bring that vision into reality.

The Official (ISC)2 SSCP CBK Reference, 6th Editio n (Hardcover, 6th Edition): M. Wills The Official (ISC)2 SSCP CBK Reference, 6th Editio n (Hardcover, 6th Edition)
M. Wills
R1,485 Discovery Miles 14 850 Ships in 12 - 17 working days

The only official body of knowledge for SSCP--(ISC)2's popular credential for hands-on security professionals--fully revised and updated 2021 SSCP Exam Outline. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification--fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements--is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training. This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Security Operations and Administration; Access Controls; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security. Designed to serve as a reference for information security professionals throughout their careers, this indispensable (ISC)2 guide: Provides comprehensive coverage of the latest domains and objectives of the SSCP Helps better secure critical assets in their organizations Serves as a complement to the SSCP Study Guide for certification candidates The Official (ISC)2 SSCP CBK Reference is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.

RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Paperback): Yan Zhang, Laurence T. Yang,... RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Paperback)
Yan Zhang, Laurence T. Yang, Jiming Chen
R2,190 Discovery Miles 21 900 Ships in 12 - 17 working days

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there has been a need for a resource that brings together timely coverage of RFIS, Sensor Networks, and their integration. Filling this need, RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes everything from the basics to insights into future directions, this cutting-edge book reviews architectures, protocols, standards, security, and applications. With sections devoted to each individual element, the text starts by covering the tags, readers, and middleware associated with RFID. Next, it provides insights into the routing, medium access control, and cross-layer optimization of WSNs. The third section focuses on the integration of RFID and WSN, addresses contemporary challenges, and illustrates concepts and applications with practical examples. This forward looking resource details the enhanced visibility and monitoring capabilities that are possible with RFID and WSNs and highlights contemporary applications including smart homes, surveillance systems, and personal health care. Providing a complete understanding of the essential fundamentals behind RFID and WSNs, this book will help you foster the skills needed to materialize the enhancements possible when these two promising technologies are used together.

Fight Fire with Fire - Proactive Cybersecurity Strategies for Today's Leaders (Hardcover): R Tarun Fight Fire with Fire - Proactive Cybersecurity Strategies for Today's Leaders (Hardcover)
R Tarun
R551 Discovery Miles 5 510 Ships in 12 - 17 working days

Organizations around the world are in a struggle for survival, racing to transform themselves in a herculean effort to adapt to the digital age, all while protecting themselves from headline-grabbing cybersecurity threats. As organizations succeed or fail, the centrality and importance of cybersecurity and the role of the CISO--Chief Information Security Officer--becomes ever more apparent. It's becoming clear that the CISO, which began as a largely technical role, has become nuanced, strategic, and a cross-functional leadership position. Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders explores the evolution of the CISO's responsibilities and delivers a blueprint to effectively improve cybersecurity across an organization. Fight Fire with Fire draws on the deep experience of its many all-star contributors. For example: Learn how to talk effectively with the Board from engineer-turned-executive Marianne Bailey, a top spokesperson well-known for global leadership in cyber Discover how to manage complex cyber supply chain risk with Terry Roberts, who addresses this complex area using cutting-edge technology and emerging standards Tame the exploding IoT threat landscape with Sonia Arista, a CISO with decades of experience across sectors, including healthcare where edge devices monitor vital signs and robots perform surgery These are just a few of the global trailblazers in cybersecurity who have banded together to equip today's leaders to protect their enterprises and inspire tomorrow's leaders to join them. With fires blazing on the horizon, there is no time for a seminar or boot camp. Cyber leaders need information at their fingertips. Readers will find insight on how to close the diversity and skills gap and become well-versed in modern cyber threats, including attacks coming from organized crime and nation-states. This book highlights a three-pronged approach that encompasses people, process, and technology to empower everyone to protect their organization. From effective risk management to supply chain security and communicating with the board, Fight Fire with Fire presents discussions from industry leaders that cover every critical competency in information security. Perfect for IT and information security professionals seeking perspectives and insights they can't find in certification exams or standard textbooks, Fight Fire with Fire is an indispensable resource for everyone hoping to improve their understanding of the realities of modern cybersecurity through the eyes of today's top security leaders.

Mathematical Theory of Advanced Computing (Paperback, 2020 ed.): Wolfgang W. Osterhage Mathematical Theory of Advanced Computing (Paperback, 2020 ed.)
Wolfgang W. Osterhage
R564 Discovery Miles 5 640 Ships in 12 - 17 working days

This book deals with computer performance by addressing basic preconditions. Besides general considerations about performance, several new approaches are presented. One of them targets memory structures by introducing the possibility of overlapping non-interfering (virtual) address spaces. This approach is based on a newly developed jump transformation between different symbol spaces. Another approach deals with efficiency and accuracy in scientific calculations. Finally the concept of a Neural Relational Data Base Management System is introduced and the performance potential of quantum computers assessed.

Cryptography (Hardcover): William Buchanan Cryptography (Hardcover)
William Buchanan
R1,923 Discovery Miles 19 230 Ships in 10 - 15 working days

Cryptography has proven to be one of the most contentious areas in modern society. For some it protects the rights of individuals to privacy and security, while for others it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption. The book has many novel features including: - full provision of Web-based material on almost every topic covered - provision of additional on-line material, such as videos, source code, and labs - coverage of emerging areas such as Blockchain, Light-weight Cryptography and Zero-knowledge Proofs (ZKPs) Key areas covered include: - Fundamentals of Encryption - Public Key Encryption - Symmetric Key Encryption - Hashing Methods - Key Exchange Methods - Digital Certificates and Authentication - Tunneling - Crypto Cracking - Light-weight Cryptography - Blockchain - Zero-knowledge Proofs This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

Data Exfiltration Threats and Prevention Techniques - Machine Learning and Memory-Based Data Security (Hardcover): Zahir Tari,... Data Exfiltration Threats and Prevention Techniques - Machine Learning and Memory-Based Data Security (Hardcover)
Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot
R2,946 Discovery Miles 29 460 Ships in 12 - 17 working days

DATA EXFILTRATION THREATS AND PREVENTION TECHNIQUES Comprehensive resource covering threat prevention techniques for data exfiltration and applying machine learning applications to aid in identification and prevention Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks by introducing existing and recently developed methods in malware protection using AI, memory forensic, and pattern matching, presenting various data exfiltration attack vectors and advanced memory-based data leakage detection, and discussing ways in which machine learning methods have a positive impact on malware detection. Providing detailed descriptions of the recent advances in data exfiltration detection methods and technologies, the authors also discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Composed of eight chapters, this book presents a better understanding of the core issues related to the cyber-attacks as well as the recent methods that have been developed in the field. In Data Exfiltration Threats and Prevention Techniques, readers can expect to find detailed information on: Sensitive data classification, covering text pre-processing, supervised text classification, automated text clustering, and other sensitive text detection approaches Supervised machine learning technologies for intrusion detection systems, covering taxonomy and benchmarking of supervised machine learning techniques Behavior-based malware detection using API-call sequences, covering API-call extraction techniques and detecting data stealing behavior based on API-call sequences Memory-based sensitive data monitoring for real-time data exfiltration detection and advanced time delay data exfiltration attack and detection Aimed at professionals and students alike, Data Exfiltration Threats and Prevention Techniques highlights a range of machine learning methods that can be used to detect potential data theft and identifies research gaps and the potential to make change in the future as technology continues to grow.

Cybersecurity and Privacy - bridging the gap (Hardcover): Samant Khajuria, Lene Sorensen, Knud Erik Skouby Cybersecurity and Privacy - bridging the gap (Hardcover)
Samant Khajuria, Lene Sorensen, Knud Erik Skouby
R2,521 R2,196 Discovery Miles 21 960 Save R325 (13%) Ships in 12 - 17 working days

The huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at company and at individual level. Cybersecurity and Privacy - bridging the gap addresses two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others. Policies, frameworks, strategies, laws, tools, techniques, and technologies - all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject. Technical topics discussed in the book include: * Cybersecurity * Encryption * Privacy policy * Trust * Security and Internet of Things * Botnets * Data risks * Cloudbased Services * Visualization

Cloud Native Go - Building Reliable Services in Unreliable Environments (Paperback): Matthew Titmus Cloud Native Go - Building Reliable Services in Unreliable Environments (Paperback)
Matthew Titmus
R1,138 Discovery Miles 11 380 Ships in 12 - 17 working days

What do Docker, Kubernetes, and Prometheus have in common? All of these cloud native technologies are written in the Go programming language. This practical book shows you how to use Go's strengths to develop cloud native services that are scalable and resilient, even in an unpredictable environment. You'll explore the composition and construction of these applications, from lower-level features of Go to mid-level design patterns to high-level architectural considerations. Each chapter builds on the lessons of the last, walking intermediate to advanced developers through Go to construct a simple but fully featured distributed key-value store. You'll learn best practices for adopting Go as your development language for solving cloud native management and deployment issues. Learn how cloud native applications differ from other software architectures Understand how Go can solve the challenges of designing scalable, distributed services Leverage Go's lower-level features, such as channels and goroutines, to implement a reliable cloud native service Explore what "service reliability" is and what it has to do with "cloud native" Apply a variety of patterns, abstractions, and tooling to build and manage complex distributed systems

Ethical Hacking and Penetration Testing Guide (Hardcover): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Hardcover)
Rafay Baloch
R5,201 Discovery Miles 52 010 Ships in 12 - 17 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback): Chuck Wilson Vein Pattern Recognition - A Privacy-Enhancing Biometric (Paperback)
Chuck Wilson
R994 Discovery Miles 9 940 Ships in 12 - 17 working days

As one of the most promising biometric technologies, vein pattern recognition (VPR) is quickly taking root around the world and may soon dominate applications where people focus is key. Among the reasons for VPR's growing acceptance and use: it is more accurate than many other biometric methods, it offers greater resistance to spoofing, it focuses on people and their privacy, and has few negative cultural connotations. Vein Pattern Recognition: A Privacy-Enhancing Biometric provides a comprehensive and practical look at biometrics in general and at vein pattern recognition specifically. It discusses the emergence of this reliable but underutilized technology and evaluates its capabilities and benefits. The author, Chuck Wilson, an industry veteran with more than 25 years of experience in the biometric and electronic security fields, examines current and emerging VPR technology along with the myriad applications of this dynamic technology. Wilson explains the use of VPR and provides an objective comparison of the different biometric methods in use today-including fingerprint, eye, face, voice recognition, and dynamic signature verification. Highlighting current VPR implementations, including its widespread acceptance and use for identity verification in the Japanese banking industry, the text provides a complete examination of how VPR can be used to protect sensitive information and secure critical facilities. Complete with best-practice techniques, the book supplies invaluable guidance on selecting the right combination of biometric technologies for specific applications and on properly implementing VPR as part of an overall security system.

Vehicular Networks - From Theory to Practice (Paperback): Stephan Olariu, Michele C. Weigle Vehicular Networks - From Theory to Practice (Paperback)
Stephan Olariu, Michele C. Weigle
R2,074 Discovery Miles 20 740 Ships in 12 - 17 working days

In spite of their importance and potential societal impact, there is currently no comprehensive source of information about vehicular ad hoc networks (VANETs). Cohesively integrating the state of the art in this emerging field, Vehicular Networks: From Theory to Practice elucidates many issues involved in vehicular networking, including traffic engineering, human factors studies, and novel computer science research. Divided into six broad sections, the book begins with an overview of traffic engineering issues, such as traffic monitoring and traffic flow modeling. It then introduces governmental and industrial efforts in the United States and Europe to set standards and perform field tests on the feasibility of vehicular networks. After highlighting innovative applications enabled by vehicular networks, the book discusses several networking-related issues, including routing and localization. The following section focuses on simulation, which is currently the primary method for evaluating vehicular networking systems. The final part explores the extent and impact of driver distraction with in-vehicle displays. Encompassing both introductory and advanced concepts, this guide covers the various areas that impact the design of applications for vehicular networks. It details key research challenges, offers guidance on developing future standards, and supplies valuable information on existing experimental studies.

Coastal Lagoons - Critical Habitats of Environmental Change (Paperback): Michael J. Kennish, Hans W. Paerl Coastal Lagoons - Critical Habitats of Environmental Change (Paperback)
Michael J. Kennish, Hans W. Paerl
R2,257 Discovery Miles 22 570 Ships in 12 - 17 working days

Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agricultural, and urban waste, overuse from fisheries, aquaculture, transportation, energy production, and other human activities. The features that make coastal lagoons vital ecosystems underline the importance of sound management strategies for long-term environmental and resource sustainability. Written by an internationally renowned group of contributors, Coastal Lagoons: Critical Habitats of Environmental Change examines the function and structure of coastal lagoonal ecosystems and the natural and anthropogenic drivers of change that affect them. The contributors examine the susceptibility of coastal lagoons to eutrophication, the indicators of eutrophic conditions, the influences of natural factors such as major storms, droughts and other climate effects, and the resulting biotic and ecosystem impairments that have developed worldwide. They provide detailed descriptions of the physical-chemical and biotic characteristics of diverse coastal lagoonal ecosystems, and address the environmental factors, forcing features, and stressors affecting hydrologic, biogeochemical, and trophic properties of these important water bodies. They also discuss the innovative tools and approaches used for assessing ecological change in the context of anthropogenically- and climatically-mediated factors. The book investigates the biogeochemical and ecological responses to nutrient enrichment and other pollutants in lagoonal estuaries and compares them to those in other estuarine types. With editors among the most noted international scholars in coastal ecology and contributors who are world-class in their fields, the chapters in this volume represent a wide array of studies on natural and anthropogenic drivers of change in coastal lagoons located in different regions of the world. Although a significant number of journal articles on the subject can be found in the literature, this book provides a single-source reference for coastal lagoons within the arena of the global environment.

Communication Architectures for Systems-on-Chip (Paperback): Jose L. Ayala Communication Architectures for Systems-on-Chip (Paperback)
Jose L. Ayala
R2,131 Discovery Miles 21 310 Ships in 12 - 17 working days

A presentation of state-of-the-art approaches from an industrial applications perspective, Communication Architectures for Systems-on-Chip shows professionals, researchers, and students how to attack the problem of data communication in the manufacture of SoC architectures. With its lucid illustration of current trends and research improving the performance, quality, and reliability of transactions, this is an essential reference for anyone dealing with communication mechanisms for embedded systems, systems-on-chip, and multiprocessor architectures-or trying to overcome existing limitations. Exploring architectures currently implemented in manufactured SoCs-and those being proposed-this book analyzes a wide range of applications, including: Well-established communication buses Less common networks-on-chip Modern technologies that include the use of carbon nanotubes (CNTs) Optical links used to speed up data transfer and boost both security and quality of service (QoS) The book's contributors pay special attention to newer problems, including how to protect transactions of critical on-chip information (personal data, security keys, etc.) from an external attack. They examine mechanisms, revise communication protocols involved, and analyze overall impact on system performance.

The Good ICT Society - From Theory to Actions (Hardcover): Gunilla Bradley The Good ICT Society - From Theory to Actions (Hardcover)
Gunilla Bradley
R2,663 R1,729 Discovery Miles 17 290 Save R934 (35%) Ships in 12 - 17 working days

What is Quality of Life in a society that has embraced information and communication technology (ICT)? What is Wisdom in this kind of society? And what things are helping or hindering us from having both wisdom and a good quality of life in ICT societies? Taking the reader through a quick analysis of the current social and psychological changes in the Information and Communication Society, Bradley challenges us to avoid becoming victims of technology - whether we are professionals, policymakers, parents or citizens. Indeed, she introduces a theoretical model based on four decades' worth of research to help the reader to understand this complex, technological world. In addition to focusing the reader's attention on convergence and acceleration, this model describes the interplay between technology, societal structure, organizational design and human roles, thus leading to what Bradley describes as a "good ICT society". Emphasising the necessity of a co-operative parallel between the automation and humanization of society, this innovative volume will be of interest to undergraduate and postgraduate students and postdoctoral researchers interested in the subjects such as Information and Communication Technology and Social Change, Psychology and Sociology, Computer Technology and Media Technology.

Managing Web Projects (Paperback): Edward B. Farkas Managing Web Projects (Paperback)
Edward B. Farkas
R2,213 Discovery Miles 22 130 Ships in 12 - 17 working days

Getting Web projects done right and delivered on time is all about efficiency. Putting the information you need and tools you can rely on at your ready disposal-Managing Web Projects-is a complete guide for project managers in the Internetworking industry. Whether you are a Web developer or an Internet Service Provider, whether your project is a quick fix, a complete overhaul, or a new start-up, this resource provides you with an organized path. It will walk you through a typical project life cycle, while providing you with all the tools and definitions needed to take charge and instill confidence in your staff and your customers. Invaluable for those seeking ISO 9001 certification, the text includes a number of detailed Work Instructions that can be used to develop a formal quality management system specific to a project management organization. They can also be leveraged in a TQM (Total Quality Management) or a Six Sigma environment. The book includes: Management guidelines for web hosting, data center migrations, site security, content development, application and Web site loading and testing, VPNs, VoIP, business continuity, and disaster recovery An Internet project management glossary, a technical Internetworking glossary, and a project management acronym table A tools suite with a proven record of success for project initiation, planning, execution, control, and close out This complete resource provides the resources needed-including dozens of time-tested templates, schedules, checklists, and flow charts-to become fully versed in and aligned with the nine knowledge areas and five major processes codified by the Project Management Body of Knowledge (PMBOK (R)).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270
Im Abbreviations, Texting & Emoticons
BarCharts Inc Fold-out book or chart R675 Discovery Miles 6 750
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,347 Discovery Miles 13 470
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,949 Discovery Miles 29 490
8 Steps to Better Security - A Simple…
K Crawley Paperback R534 Discovery Miles 5 340
Hacking For Dummies
K Beaver Paperback R555 Discovery Miles 5 550
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Age Of Agency - Rise With A.I.
Kerushan Govender Paperback R350 R280 Discovery Miles 2 800
Building Microservices
Sam Newman Paperback R1,212 R864 Discovery Miles 8 640

 

Partners