0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (255)
  • R250 - R500 (857)
  • R500+ (13,694)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Networking Explained (Paperback, 2nd edition): Michael Gallo, William M Hancock Phd Cissp Cism Networking Explained (Paperback, 2nd edition)
Michael Gallo, William M Hancock Phd Cissp Cism
R2,300 Discovery Miles 23 000 Ships in 10 - 15 working days

Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.
Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
Wireless networks
Convergence of voice and data
Multimedia networking

Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.): Nikolaos P. Preve Grid Computing - Towards a Global Interconnected Infrastructure (Hardcover, Edition.)
Nikolaos P. Preve
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

This book presents research from many of the major projects involved in the emerging global grid infrastructure. With a particular focus on the practical advantages and applications of grid computing - including real case studies - the book provides an in-depth study of grid technology for a wide range of different needs. Topics: examines a remote instrumentation infrastructure, and a methodology to support e-science applications on e-infrastructures; describes the GEMS storage system, and pipeline workflows for optimizing end-to-end performance in wide-area networks; investigates semantic grid system architecture, social grid agents, and monitoring platforms designed for large-scale distributed systems; explores job control using service-level agreements; introduces the Composable Services Architecture for dynamic service provisioning, and the semantically driven communication middleware platform, Phoenix; discusses the PhyloGrid application, and a numerical simulation performed using grid computing.

Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS... Analysis, Architectures and Modelling of Embedded Systems - Third IFIP TC 10 International Embedded Systems Symposium, IESS 2009, Langenargen, Germany, September 14-16, 2009, Proceedings (Hardcover, 2009 ed.)
Achim Rettberg, Mauro C. Zanella, Michael Amann, Michael Keckeisen, Franz J. Rammig
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This book presents the technical program of the International Embedded Systems Symposium (IESS) 2009. Timely topics, techniques and trends in embedded system design are covered by the chapters in this volume, including modelling, simulation, verification, test, scheduling, platforms and processors. Particular emphasis is paid to automotive systems and wireless sensor networks. Sets of actual case studies in the area of embedded system design are also included. Over recent years, embedded systems have gained an enormous amount of proce- ing power and functionality and now enter numerous application areas, due to the fact that many of the formerly external components can now be integrated into a single System-on-Chip. This tendency has resulted in a dramatic reduction in the size and cost of embedded systems. As a unique technology, the design of embedded systems is an essential element of many innovations. Embedded systems meet their performance goals, including real-time constraints, through a combination of special-purpose hardware and software components tailored to the system requirements. Both the development of new features and the reuse of existing intellectual property components are essential to keeping up with ever more demanding customer requirements. Furthermore, design complexities are steadily growing with an increasing number of components that have to cooperate properly. Embedded system designers have to cope with multiple goals and constraints simul- neously, including timing, power, reliability, dependability, maintenance, packaging and, last but not least, price.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R7,802 Discovery Miles 78 020 Ships in 18 - 22 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Introduction to Modern Sleep Technology (Hardcover, 2012 ed.): Rayleigh Ping-Ying Chiang, Shih-Chun Kang Introduction to Modern Sleep Technology (Hardcover, 2012 ed.)
Rayleigh Ping-Ying Chiang, Shih-Chun Kang
R2,692 Discovery Miles 26 920 Ships in 18 - 22 working days

Sleep medicine has been developing for more than 40 years. The current concepts in sleep technology are mainly centered on polysomnography (PSG) and issues related to sleep technicians. However, the editorsbelieve that the true value of technology is revealed only when benefits to humanity are manifest. To this end, they endeavor to create a new era in sleep technology, one that will improve the quality of people's sleep and daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

This edited book, Introduction to Modern Sleep Technology, provides a comprehensive reference volume to the latest advancements in the area of Sleep Technology. It offers an excellent range of insights and opinions from leading researchers and experts in multiple disciplines spanning academia, clinical practice and industry. Up-to-date insights into the current research topics in this field are featured in addition to the latest technological advances with reference to appropriate working examples.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Thecurrentbookcombines the five dimensions of knowledge, i.e., sleep medicine, clinical psychology engineering, industrial design and technology management to ensure the content is applicable to people's daily lives.

Wireless Communications & Networking (Hardcover): Vijay Garg Wireless Communications & Networking (Hardcover)
Vijay Garg
R2,209 Discovery Miles 22 090 Ships in 10 - 15 working days

This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who need to understand this industry. In the last two decades, many books have been written on the subject of wireless communications and networking. However, mobile data networking and mobile communications were not fully addressed in a unified fashion. This book fills that gap in the literature and is written to provide essentials of wireless communications and wireless networking, including Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), and Wireless Wide Area Networks (WWAN).
The first ten chapters of the book focus on the fundamentals that are required to study mobile data networking and mobile communications. Numerous solved examples have been included to show applications of theoretical concepts. In addition, unsolved problems are given at the end of each chapter for practice. (A solutions manual will be available.)
After introducing fundamental concepts, the book focuses on mobile networking aspects. Four chapters are devoted on the discussion of WPAN, WLAN, WWAN, and internetworking between WLAN and WWAN. Remaining seven chapters deal with other aspects of mobile communications such as mobility management, security, cellular network planning, and 4G systems.
A unique feature of this book that is missing in most of the available books on wireless communications and networking is a balance between the theoretical and practical concepts.
Moreover, this book can be used to teach a one/two semester course in mobile data networking and mobile communications to ECE and CS students.
*Details the essentials of Wireless Personal Area Networks(WPAN), Wireless Local Are Networks (WLAN), and Wireless Wide Area Networks (WWAN)
*Comprehensive and up-to-date coverage including the latest in standards and 4G technology
*Suitable for classroom use in senior/first year grad level courses. Solutions manual and other instructor support available

Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover): Information Resources Management... Research Anthology on Fandoms, Online Social Communities, and Pop Culture (Hardcover)
Information Resources Management Association
R9,276 Discovery Miles 92 760 Ships in 18 - 22 working days

The internet has grown to become one of the largest communication hubs in history. With its ability to share content and create community bonds, it has seen many fandoms and online social communities develop within the past decades. While there are some detriments to these communities, there are also many benefits and potential uses for the betterment of society. The Research Anthology on Fandoms, Online Social Communities, and Pop Culture explores the ways in which the internet has presented itself as a platform for communities to gather. This essential reference source discusses the engagement of these communities, social media use, and the uses of these communities for education. Covering topics such as digital communities, transmedia language learning, and digital humanities, this book is a vital tool for educators of K-12 and higher education, digital folklorists, sociologists, communications researchers, online administrators, community leaders, and academicians.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 2 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R7,808 Discovery Miles 78 080 Ships in 18 - 22 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Content Delivery Networks (Hardcover, 2008 ed.): Rajkumar Buyya, Mukaddim Pathan, Athena Vakali Content Delivery Networks (Hardcover, 2008 ed.)
Rajkumar Buyya, Mukaddim Pathan, Athena Vakali
R5,888 Discovery Miles 58 880 Ships in 18 - 22 working days

"Content Delivery Networks" enables the readers to understand the basics, to identify the underlying technology, to summarize their knowledge on concepts, ideas, principles and various paradigms which span on broad CDNs areas. Therefore, aspects of CDNs in terms of basics, design process, practice, techniques, performances, platforms, applications, and experimental results have been presented in a proper order. Fundamental methods, initiatives, significant research results, as well as references for further study have also been provided. Comparison of different design and development approaches are described at the appropriate places so that new researchers as well as advanced practitioners can use the CDNs evaluation as a research roadmap. All the contributions have been reviewed, edited, processed, and placed in the appropriate order to maintain consistency so that any reader irrespective of their level of knowledge and technological skills in CDNs would get the most out of it. The book is organized into three parts, namely, Part I: CDN Fundamentals; Part II: CDN Modeling and Performance; and Part III: Advanced CDN Platforms and Applications. The organization ensures the smooth flow of material as successive chapters build on prior ones.

RFID Security (Paperback): Frank Thornton, Chris Lanthem RFID Security (Paperback)
Frank Thornton, Chris Lanthem
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books.
RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.
Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .
* Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005
* Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information
* Little competition in a market desperate for information

Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover): Richard G Lowe Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover)
Richard G Lowe
R956 R835 Discovery Miles 8 350 Save R121 (13%) Ships in 18 - 22 working days
IPv6 Core Protocols Implementation (Hardcover): Qing Li, Tatuya Jinmei, Keiichi Shima IPv6 Core Protocols Implementation (Hardcover)
Qing Li, Tatuya Jinmei, Keiichi Shima
R1,932 Discovery Miles 19 320 Ships in 10 - 15 working days

IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago.

This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.
Covering a snapshot version of KAME dated April 2003 based on FreeBSD 4.8Extensive line-by-line code listings with meticulous explanation of their rationale and use for the KAME snapshot implementation, which is generally applicable to most recent versions of the KAME IPv6 stack including those in recent releases of BSD variantsNumerous diagrams and illustrations help in visualizing the implementation In-depth discussion of the standards provides intrinsic understanding of the specifications

Developments in Telecommunications - With a Focus on SS7 Network Reliability (Hardcover, 2008 ed.): Gerhard Rufa Developments in Telecommunications - With a Focus on SS7 Network Reliability (Hardcover, 2008 ed.)
Gerhard Rufa
R2,682 Discovery Miles 26 820 Ships in 18 - 22 working days

In this book we summarize important developments in telecommunications with a focus on Signalling System No. 7 (SS 7) network reliability. But why is SS 7 network security and reliability so important? According to the Open Systems Interconnection (OSI) model the term "network" refers to the Layer 3 network service, which is offered by the Message Transfer Part (MTP) and Signalling Connection Control Part (SCCP) to higher layers. An SS 7 network outage results in a breakdown of signalling between the individual nodes of the network, so that telecommunication network services are no longer available to customers. Apart from the tremendous nancial damage to the network operator, the social consequences of such a network breakdown cannot be underestimated. Since the MTP is the central part of the SS 7 network, it is of crucial importance for network security and reliability. The MTP is published in different versions and should now be what we call "stable." Is it really stable? Does it work properly in real networks? Does it t new requirements so that no further changes within the MTP are needed? Various different implementations have existed for a long time and are used in national as well as the international network. Due to this, an objective is not to p- form any further changes within the MTP in order to avoid compatibility problems with existing and running systems. Experience shows that compatibility problems are always related to further development of the MTP.

Network-Embedded Management and Applications - Understanding Programmable Networking Infrastructure (Hardcover, 2012):... Network-Embedded Management and Applications - Understanding Programmable Networking Infrastructure (Hardcover, 2012)
Alexander Clemm, Ralf Wolter
R4,737 Discovery Miles 47 370 Ships in 18 - 22 working days

Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "next-generation" Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency.

In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. "

Configuring Juniper Networks NetScreen and SSG Firewalls (Paperback): Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin Configuring Juniper Networks NetScreen and SSG Firewalls (Paperback)
Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin
R1,077 R843 Discovery Miles 8 430 Save R234 (22%) Ships in 10 - 15 working days

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.
Configure Juniper s Instant Virtual Extranet (IVE)
Install and set up IVE through either the command line interface (CLI) or Web-based console.
Master the 3 Rs: Realms, Roles, and Resources
Realize the potential of the 3Rs for endpoint security, sign-in policies, and authorization of servers.
Get Inside both the Windows and Java Versions of Secure Application Manager (SAM)
Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field.
Integrate IVE with Terminal Services and Citrix
Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet.
Ensure Endpoint Security
Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network.
Manage the Remote Access Needs of Your Organization
Configure Web access, file access and telnet/SSH access for remote users and offices.
Configure Core Networking Components through the System Menu
Create clusters, manage virtual systems, and monitor logs, reports, and alerts.
Create Bullet-Proof Sign-in Policies
Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages.
Use the IVE for Log-Related Tasks
Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting."

Ethernet Networking for the Small Office and Professional Home Office (Paperback): Jan L. Harrington Ethernet Networking for the Small Office and Professional Home Office (Paperback)
Jan L. Harrington
R1,402 Discovery Miles 14 020 Ships in 10 - 15 working days

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.
Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.
One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.
In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.
This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.
*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Intrusion Prevention and Active Response - Deploying Network and Host IPS (Paperback): Michael Rash, Angela Orebaugh, Graham... Intrusion Prevention and Active Response - Deploying Network and Host IPS (Paperback)
Michael Rash, Angela Orebaugh, Graham Clark
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
* Corporate spending for Intrusion Prevention systems increased dramatically by 11% in the last quarter of 2004 alone
* Lead author, Michael Rash, is well respected in the IPS Community, having authored FWSnort, which greatly enhances the intrusion prevention capabilities of the market-leading Snort IDS

Partitional Clustering Algorithms (Hardcover, 2015 ed.): M. Emre Celebi Partitional Clustering Algorithms (Hardcover, 2015 ed.)
M. Emre Celebi
R4,127 R3,596 Discovery Miles 35 960 Save R531 (13%) Ships in 10 - 15 working days

This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field.

Network Classification for Traffic Management - Anomaly detection, feature selection, clustering and classification... Network Classification for Traffic Management - Anomaly detection, feature selection, clustering and classification (Hardcover)
Zahir Tari, Adil Fahad, Abdulmohsen Almalawi, Xun Yi
R3,104 R2,806 Discovery Miles 28 060 Save R298 (10%) Ships in 18 - 22 working days

With the massive increase of data and traffic on the Internet within the 5G, IoT and smart cities frameworks, current network classification and analysis techniques are falling short. Novel approaches using machine learning algorithms are needed to cope with and manage real-world network traffic, including supervised, semi-supervised, and unsupervised classification techniques. Accurate and effective classification of network traffic will lead to better quality of service and more secure and manageable networks. This authored book investigates network traffic classification solutions by proposing transport-layer methods to achieve better run and operated enterprise-scale networks. The authors explore novel methods for enhancing network statistics at the transport layer, helping to identify optimal feature selection through a global optimization approach and providing automatic labelling for raw traffic through a SemTra framework to maintain provable privacy on information disclosure properties.

System-Level Design Methodologies for Telecommunication (Hardcover, 2014 ed.): Nicolas Sklavos, Michael Hubner, Diana... System-Level Design Methodologies for Telecommunication (Hardcover, 2014 ed.)
Nicolas Sklavos, Michael Hubner, Diana Goehringer, Paris Kitsos
R3,807 R3,277 Discovery Miles 32 770 Save R530 (14%) Ships in 10 - 15 working days

This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.

Foundations of Computer Security (Hardcover, 2006 ed.): David Salomon Foundations of Computer Security (Hardcover, 2006 ed.)
David Salomon
R1,686 Discovery Miles 16 860 Ships in 10 - 15 working days

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided.

Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Wireless Sensor Networks and Ecological Monitoring (Hardcover, 2013 ed.): Subhas C Mukhopadhyay, Joe-Air Jiang Wireless Sensor Networks and Ecological Monitoring (Hardcover, 2013 ed.)
Subhas C Mukhopadhyay, Joe-Air Jiang
R5,350 Discovery Miles 53 500 Ships in 10 - 15 working days

This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.

Smart Grids: Security and Privacy Issues (Hardcover, 1st ed. 2017): Kianoosh G. Boroojeni, M. Hadi Amini, S.S. Iyengar Smart Grids: Security and Privacy Issues (Hardcover, 1st ed. 2017)
Kianoosh G. Boroojeni, M. Hadi Amini, S.S. Iyengar
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of smart grids. The authors utilize an advanced interdisciplinary approach to address the existing security and privacy issues and propose legitimate countermeasures for each of them in the standpoint of both computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools and illustrated by real-world examples.

Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New): Peyman Kabiri Privacy, Intrusion Detection, and Response - Technologies for Protecting Networks (Hardcover, New)
Peyman Kabiri
R4,872 Discovery Miles 48 720 Ships in 18 - 22 working days

Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.

Network Control and Engineering for QOS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8. Third International... Network Control and Engineering for QOS, Security and Mobility, III - IFIP TC6 / WG6.2, 6.6, 6.7 and 6.8. Third International Conference on Network Control and Engineering for QoS, Security and Mobility, NetCon 2004 on November 2-5, 2004, Palma de Mallorca, Spain (Hardcover, 2005 ed.)
Dominique Gaiti, Sebastia Galmes, Ramon Puigjaner
R4,056 Discovery Miles 40 560 Ships in 18 - 22 working days

This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con'2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and sponsored by the following Working Groups: WG6.2 (Network and Internetwork Architectures), WG6.6 (Management of Networks and Distributed Systems), WG6.7 (Smart Networks) and WG6.8 (Mobile and Wireless Communications). The rapid evolution of the networking industry introduces new exciting challenges that need to be explored by the research community. The adoption of Internet as the global network infrastructure places the issue of quality of service among one of the hot topics nowadays: a huge diversity of applications with quite different service requirements must be supported over a basic core of protocols. Also, the open and uncontrolled nature of Internet enforces the need to guarantee secure transactions among users, thus placing security as another hot topic. Finally, the explosion of mobility and its integration as part of the global infrastructure are probably now the most challenging issues in the networking field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Host in the Machine - Examining the…
Angela Thomas-Jones Paperback R1,318 Discovery Miles 13 180
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
Community Engagement in the Online Space
Michelle Dennis, James H Albert Hardcover R5,370 Discovery Miles 53 700
Introduction to Copper Cabling…
John Crisp Paperback R967 Discovery Miles 9 670
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Cable Engineering for Local Area…
B.J. Elliott Hardcover R3,208 Discovery Miles 32 080
Guide to Networking Essentials
Greg Tomsho Paperback R1,365 R1,269 Discovery Miles 12 690
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Digital Signal Processing and…
Dag Stranneby Paperback R1,371 Discovery Miles 13 710
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610

 

Partners