0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (879)
  • R500+ (13,598)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information... Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
David Avison, George M. Kasper, Barbara Pernici, Isabel Ramos, Dewald Roode
R2,774 Discovery Miles 27 740 Ships in 18 - 22 working days

Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.

Network Control and Engineering for QoS, Security and Mobility, IV - Fourth IFIP International Conference on Network Control... Network Control and Engineering for QoS, Security and Mobility, IV - Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, Lannion, France, November 14-18, 2005 (Hardcover, 2007 ed.)
Dominique Gaiti
R2,844 Discovery Miles 28 440 Ships in 18 - 22 working days

This volume contains the proceedings of the Fourth IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, NETCON 2005. The conference, organized by the International Federation for Information Processing, was held in Lannion, France from November 14-18, 2005. Coverage explores network security, network policy, quality of service, wireless networks, intelligent networks, and performance evaluation.

Harbour Protection Through Data Fusion Technologies (Hardcover, 2009 ed.): Elisa Shahbazian, Galina Rogova, Michael J. DeWeert Harbour Protection Through Data Fusion Technologies (Hardcover, 2009 ed.)
Elisa Shahbazian, Galina Rogova, Michael J. DeWeert
R5,776 Discovery Miles 57 760 Ships in 18 - 22 working days

An Advanced Research Workshop (ARW) "Data Fusion Technologies for Harbour Protection" was held in Tallinn, Estonia 27 June-1 July, 2005. This workshop was organized by request of the NATO Security Through Science Programme and the Defence Investment Division. An ARW is one of many types of funded group support mechanisms established by the NATO Science Committee to contribute to the critical assessment of existing knowledge on new important topics, to identify directions for future research, and to promote close working relationships between scientists from different countries and with different professional experiences. The NATO Science Committee was approved at a meeting of the Heads of Government of the Alliance in December 1957, subsequent to the 1956 recommendation of "Three Wise Men" - Foreign Ministers Lange (Norway), Martino (Italy) and Pearson (Canada) on Non-Military Cooperation in NATO. The NATO Science Committee established the NATO Science Programme in 1958 to encourage and support scientific collaboration between individual scientists and to foster scientific development in its member states. In 1999, following the end of the Cold War, the Science Programme was transformed so that support is now devoted to collaboration between Partner-country and NATO-country scientists or to contributing towards research support in Partner countries. Since 2004, the Science Programme was further modified to focus exclusively on NATO Priority Research Topics (i. e. Defence Against Terrorism or Countering Other Threats to Security) and also preferably on a Partner country priority area.

Right Way to Select Technology - Get the Real Story on Finding the Best Fit (Paperback): Tony Byrne, Jarrod Gingras Right Way to Select Technology - Get the Real Story on Finding the Best Fit (Paperback)
Tony Byrne, Jarrod Gingras
R699 Discovery Miles 6 990 Ships in 18 - 22 working days
Intelligent Multimedia Technologies for Networking Applications - Techniques and Tools (Hardcover, New): Dimitris N.... Intelligent Multimedia Technologies for Networking Applications - Techniques and Tools (Hardcover, New)
Dimitris N. Kanellopoulos
R4,894 Discovery Miles 48 940 Ships in 18 - 22 working days

As ubiquitous multimedia applications benefit from the rapid development of intelligent multimedia technologies, there is an inherent need to present frameworks, techniques and tools that adopt these technologies to a range of networking applications. Intelligent Multimedia Technologies for Networking Applications: Techniques and Tools promotes the discussion of specific solutions for improving the quality of multimedia experience while investigating issues arising from the deployment of techniques for adaptive video streaming. This reference source provides relevant theoretical frameworks and leading empirical research findings and is suitable for practitioners and researchers in the area of multimedia technology.

RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl): Paris Kitsos, Yan Zhang RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl)
Paris Kitsos, Yan Zhang
R4,082 Discovery Miles 40 820 Ships in 18 - 22 working days

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips.

Cloud Computing in Financial Services (Hardcover): B. Nicoletti Cloud Computing in Financial Services (Hardcover)
B. Nicoletti
R3,278 Discovery Miles 32 780 Ships in 10 - 15 working days

Financial institutions need to increase revenues, decrease cost and be compliant in these difficult times. To meet all these challenges they need to consider disruptive innovations. Cloud computing is one of them. It helps in introducing innovative services, re-engineer processes, improve agility and optimize value. The book analyses in depth the cloud computing model and its current and potential use in financial services. Cloud Computing can change the paradigm of the financial institutions. the word "Bank" comes from the Italian word "Banco," since in the 1300s banking was one on a desk in the streets. The new "banco," the new "desk," will be cloud. Financial institutions must use the model of Cloud Computing for their transformation to a new paradigm.
This book is a blend of academic research, consultancy practice and case studies. It helps in considering opportunities and risks, optimize vendor relationships and organize for the best.

Handbook of Vascular Biometrics (Hardcover, 1st ed. 2020): Andreas Uhl, Christoph Busch, Sebastien Marcel, Raymond Veldhuis Handbook of Vascular Biometrics (Hardcover, 1st ed. 2020)
Andreas Uhl, Christoph Busch, Sebastien Marcel, Raymond Veldhuis
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.

Broadband Satellite Communication Systems and the Challenges of Mobility - IFIP TC6 Workshops on Broadband Satellite... Broadband Satellite Communication Systems and the Challenges of Mobility - IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges of Mobility, World Computer Congress August 22-27, 2004, Toulouse, France (Hardcover, 2005 ed.)
Thierry Gayraud, Michel Mazella, Fernando Pedro Lopes Boavida Fernandes, Edmundo Heitor da Silva Monteiro, Joao Gilberto De Matos Orvalho
R2,795 Discovery Miles 27 950 Ships in 18 - 22 working days

Broadband Satellite Communication Systems and the Challenges of Mobility is an essential reference for both academic and professional researchers in the field of telecommunications, computer networking and wireless networks.

Recently the request of multimedia services has been rapidly increasing and satellite networks appear to be attractive for a fast service deployment and for extending the typical service area of terrestrial systems. In comparison with traditional wide area networks, a characteristic of satellite communication systems is their ability in broadcasting and multicasting multimedia information flows anywhere over the satellite coverage. The papers presented in this volume highlight key areas such as Satellite Network Architectures, Services and Applications; Mobile Satellite Systems and Services; and Hybrid Satellite and Terrestrial Networks.

Mobility will inevitably be one of the main characteristics of future networks, terminals and applications and, thus, extending and integrating fixed network protocols and services to mobile systems represents one of the main issues of present networking. The secondary focus of this volume is on challenges of mobility, that is, on technologies, protocols and services for the support of seamless and nomadic user access to new classes of applications in person-to-person, device-to-device and device-to-person environments. The book comprises recent results of research and development in the following areas; Seamless mobility; Mobile ad hoc and sensor networks; Analysis, simulation and measurements of mobile and wireless systems; Integration and inter-working of wired and wireless networks; QoS in mobile and wireless networks; Future trends and issues concerning mobility.

This state -of-the-art volume contains a collection of papers from two of the workshops of the 18th IFIP World Computer Congress, held August 22-27, 2004, in Toulouse, France: the Workshop on Broadband Satellite Communication Systems, and the Workshop on the Challenges of Mobility.

Data Intensive Storage Services for Cloud Environments (Hardcover, New): Dimosthenis Kyriazis, Athanasios Voulodimos, Spyridon... Data Intensive Storage Services for Cloud Environments (Hardcover, New)
Dimosthenis Kyriazis, Athanasios Voulodimos, Spyridon V. Gogouvitis, Theodora Varvarigou
R4,698 Discovery Miles 46 980 Ships in 18 - 22 working days

With the evolution of digitised data, our society has become dependent on services to extract valuable information and enhance decision making by individuals, businesses, and government in all aspects of life. Therefore, emerging cloud-based infrastructures for storage have been widely thought of as the next generation solution for the reliance on data increases. Data Intensive Storage Services for Cloud Environments provides an overview of the current and potential approaches towards data storage services and its relationship to cloud environments. This reference source brings together research on storage technologies in cloud environments and various disciplines useful for both professionals and researchers.

Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019): Song Y. Yan Cybercryptography: Applicable Cryptography for Cyberspace Security (Hardcover, 1st ed. 2019)
Song Y. Yan
R3,174 Discovery Miles 31 740 Ships in 18 - 22 working days

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New): Advances In Security and Payment Methods for Mobile Commerce (Hardcover, New)
R2,383 Discovery Miles 23 830 Ships in 18 - 22 working days

Recently, the emergence of wireless and mobile networks has made possible the admission of electronic commerce to a new application and research subject: mobile commerce, defined as the exchange or buying and selling of commodities, services, or information on the Internet through the use of mobile handheld devices. In just a few years, mobile commerce has emerged from nowhere to become the hottest new trend in business transactions. However, the prosperity and popularity of mobile commerce will be brought to a higher level only if information is securely and safely exchanged among end systems (mobile users and content providers). Advances in Security and Payment Methods for Mobile Commerce includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academics and industrialists. It covers research and development results of lasting significance in the theory, design, implementation, analysis, and application of mobile commerce security and payment.

Regularized Radial Basis Function Networks - Theory & Applications (Hardcover): PV Yee Regularized Radial Basis Function Networks - Theory & Applications (Hardcover)
PV Yee
R3,883 Discovery Miles 38 830 Ships in 18 - 22 working days

Simon Haykin is a well-known author of books on neural networks.
* An authoritative book dealing with cutting edge technology.
* This book has no competition.

Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.): Pascal Bouvry, Horacio... Intelligent Decision Systems in Large-Scale Distributed Environments (Hardcover, 2011 ed.)
Pascal Bouvry, Horacio Gonzalez-Velez, Joanna Kolodziej
R4,072 Discovery Miles 40 720 Ships in 18 - 22 working days

One of the most challenging issues for the intelligent decision systems is to effectively manage the large-scale complex distributed environments such as computational clouds, grids, ad hoc and P2P networks, under the different types of users, their relations, and real-world uncertainties. In this context the IT resources and services usually belong to different owners (institutions, enterprises, or individuals) and are managed by different administrators. These administrators conform to different sets of rules and configuration directives, and can impose different usage policies on the system users. Additionally, uncertainties are presented in various types of information that are incomplete, imprecise, fragmentary or overloading, which hinders the full and precise determination of the evaluation criteria, their subsequent and selection, the assignment scores, and eventually the final integrated decision result.

This book presents new ideas, analysis, implementations and evaluation of the next generation intelligent techniques for solving complex decision problems in large-scale distributed systems. In 15 chapters several important formulations of the decision problems in heterogeneous environments are identified and a review of the recent approaches, from game theoretical models and computational intelligent techniques, such as genetic, memetic and evolutionary algorithms, to intelligent multi-agent systems and networking are presented. We believe that this volume will serve as a reference for the students, researchers and industry practitioners working in or are interested in joining interdisciplinary works in the areas of intelligent decision systems using emergent distributed computing paradigms. It will also allow newcomers to grasp key concerns and potential solutions on the selected topics."

Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition.
2nd Printing. 2008): Deo... Scheduling in Distributed Computing Systems - Analysis, Design and Models (Hardcover, 1st Edition. 2nd Printing. 2008)
Deo Prakash Vidyarthi, Biplab Kumer Sarker, Anil Kumar Tripathi, Laurence Tianruo Yang
R4,044 Discovery Miles 40 440 Ships in 18 - 22 working days

Scheduling in Distributed Computing Systems: Analysis, Design and Models intends to inculcate the innovative ideas for the scheduling aspect. Although the models in this book are designed for distributed systems, the same information is applicable for any type of system (i.e., where distributed processing is required). Scheduling in Distributed Computing Systems: Analysis, Design and Models will dramatically improve the design and management of the processes for industry professionals. This book deals exclusively with the scheduling aspect, which finds little space in other distributed operating system books. Scheduling in Distributed Computing Systems: Analysis, Design and Models is structured for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a reference for graduate-level students in management sciences, and computer science for distributed computing system classes.

Electronics System Design Techniques for Safety Critical Applications (Hardcover, 2009 ed.): Luca Sterpone Electronics System Design Techniques for Safety Critical Applications (Hardcover, 2009 ed.)
Luca Sterpone
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

What is exactly "Safety"? A safety system should be defined as a system that will not endanger human life or the environment. A safety-critical system requires utmost care in their specification and design in order to avoid possible errors in their implementation that should result in unexpected system's behavior during his operating "life." An inappropriate method could lead to loss of life, and will almost certainly result in financial penalties in the long run, whether because of loss of business or because the imposition of fines. Risks of this kind are usually managed with the methods and tools of the "safety engineering." A life-critical system is designed to 9 lose less than one life per billion (10 ). Nowadays, computers are used at least an order of magnitude more in safety-critical applications compared to two decades ago. Increasingly electronic devices are being used in applications where their correct operation is vital to ensure the safety of the human life and the environment. These application ranging from the anti-lock braking systems (ABS) in automobiles, to the fly-by-wire aircrafts, to biomedical supports to the human care. Therefore, it is vital that electronic designers be aware of the safety implications of the systems they develop. State of the art electronic systems are increasingly adopting progr- mable devices for electronic applications on earthling system. In particular, the Field Programmable Gate Array (FPGA) devices are becoming very interesting due to their characteristics in terms of performance, dimensions and cost.

Smart Card Security and Applications (Hardcover): Mike Hendry Smart Card Security and Applications (Hardcover)
Mike Hendry
R2,845 Discovery Miles 28 450 Ships in 18 - 22 working days

Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.

High-speed Communication Networks - Proceedings of TriComm '92 Held in Raleigh, North Carolina, February 27-28, 1992... High-speed Communication Networks - Proceedings of TriComm '92 Held in Raleigh, North Carolina, February 27-28, 1992 (Hardcover, New)
Harry G. Perros
R2,425 Discovery Miles 24 250 Ships in 18 - 22 working days

Local ATM.- Architecture of Local and Metropolitan ATM Networks: New Trends.- Supercomputer Communications as an Application for ATM Local Area Networks.- Gigabit Local Area Networks.- Congestion Control I.- An Overview of Bandwidth Management Procedures in High-Speed Networks.- Performance of the Buffered Leaky Bucket Policing Mechanism.- Congestion Control II.- Explicit Foward Congestion Notification in ATM Networks.- A Novel Architecture and Flow Control Scheme for Private ATM Networks.- Gateway Congestion Controls in High-Speed Backbone Networks.- Standards.- What's New in B-ISDN Standards?.- Routing.- Routing in ATM Networks.- A Queueing-Network Model for Half-Duplex Routing in Data Communication Networks.- Transport Protocols.- The Xpress Transfer Protocol.- Radiology Communications for Imaging Systems.- High-Speed Transport Protocol Evaluation in the VISTAnet Project.- Traffic Measurements.- Traffic Models for ISDN and B-ISDN Users.- Traffic Characterization in a Wide Area Network.- Telecommunications Software Engineering.- Engineering of Telecommunications Software.- Reliability of Telecommunications Software: Assessing Sensitivity of Least Squares Reliability Estimates.- Software Metrics and the Quality of Telecommunication Software.

RFID Security - A Lightweight Paradigm (Hardcover, 1st ed. 2017): Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi RFID Security - A Lightweight Paradigm (Hardcover, 1st ed. 2017)
Ahmed Khattab, Zahra Jeddi, Esmaeil Amini, Magdy Bayoumi
R3,290 Discovery Miles 32 900 Ships in 10 - 15 working days

This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.): Zoltan Juhasz, Peter Kacsuk, Dieter... Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.)
Zoltan Juhasz, Peter Kacsuk, Dieter Kranzlmuller
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

DAPSY (Austrian-Hungarian Workshop on Distributed and Parallel Systems) is an international conference series with biannual events dedicated to all aspects of distributed and parallel computing. DAPSY started under a different name in 1992 (Sopron, Hungary) as regional meeting of Austrian and Hungarian researchers focusing on transputer-related parallel computing; a hot research topic of that time. A second workshop followed in 1994 (Budapest, Hungary). As transputers became history, the scope of the workshop widened to include parallel and distributed systems in general and the 1st DAPSYS in 1996 (Miskolc, Hungary) reflected the results of these changes.

Distributed and Parallel Systems: Cluster and Grid Computing is an edited volume based on DAPSYS, 2004, the 5th Austrian-Hungarian Workshop on Distributed and Parallel Systems. The workshop was held in conjunction with EuroPVM/MPI-2004, Budapest, Hungary September 19-22, 2004.

Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016): George... Cybersecurity in the European Union - Resilience and Adaptability in Governance Policy (Hardcover, 1st ed. 2016)
George Christou
R4,245 Discovery Miles 42 450 Ships in 10 - 15 working days

Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.

Bayesian Network Technologies - Applications and Graphical Models (Hardcover): Bayesian Network Technologies - Applications and Graphical Models (Hardcover)
R2,624 Discovery Miles 26 240 Ships in 18 - 22 working days

Bayesian networks are now being used in a variety of artificial intelligence applications. These networks are high-level representations of probability distributions over a set of variables that are used for building a model of the problem domain. ""Bayesian Network Technologies: Applications and Graphical Models"" provides an excellent and well-balanced collection of areas where Bayesian networks have been successfully applied. This book describes the underlying concepts of Bayesian Networks in an interesting manner with the help of diverse applications, and theories that prove Bayesian networks valid. ""Bayesian Network Technologies: Applications and Graphical Models"" provides specific examples of how Bayesian networks are powerful machine learning tools critical in solving real-life problems.

Surviving Cyberwar (Hardcover): Richard Stiennon Surviving Cyberwar (Hardcover)
Richard Stiennon
R2,853 Discovery Miles 28 530 Ships in 10 - 15 working days

Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: *begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; *follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; *moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; *provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and *finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.

Information Innovation Technology in Smart Cities (Hardcover, 1st ed. 2018): Leila Ismail, Liren Zhang Information Innovation Technology in Smart Cities (Hardcover, 1st ed. 2018)
Leila Ismail, Liren Zhang
R4,778 Discovery Miles 47 780 Ships in 10 - 15 working days

This book describes Smart Cities and the information technologies that will provide better living conditions in the cities of tomorrow. It brings together research findings from 27 countries across the globe, from academia, industry and government. It addresses a number of crucial topics in state of the arts of technologies and solutions related to smart cities, including big data and cloud computing, collaborative platforms, communication infrastructures, smart health, sustainable development and energy management. Information Innovation Technology in Smart Cities is essential reading for researchers working on intelligence and information communication systems, big data, Internet of Things, Cyber Security, and cyber-physical energy systems. It will be also invaluable resource for advanced students exploring these areas.

Cloud Computing Technologies for Connected Government (Hardcover): Zaigham Mahmood Cloud Computing Technologies for Connected Government (Hardcover)
Zaigham Mahmood
R4,890 Discovery Miles 48 900 Ships in 18 - 22 working days

In the developed world, there is an increasing trend towards the use of e-government to further involve citizens in the maintenance of their country. This is not only an improved way to promote existing methods of citizen engagement such as voting or taxation; it also makes information more accessible and increases opportunities for average citizens to make their voices heard. Cloud Computing Technologies for Connected Government explores the latest research on the use of e-government for enhancing the effectiveness and transparency of public institutions. Featuring coverage on cloud-related frameworks and strategies, barriers to e-government development and practice, and case studies revealing the best guidelines for efficient technology use, this timely publication is indispensable for students, educators, information system specialists, technology experts, and anyone involved in public administration or the management of government departments. This book highlights chapters on a broad scope of topics including, but not limited to, citizen empowerment, collaborative public service, communication through social media, cost benefits of the Cloud, electronic voting systems, identity management, legal issues, and security and privacy for e-government users.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Integrated Human-Machine Intelligence…
Wei Liu Paperback R3,435 Discovery Miles 34 350
Artificial Intelligence for Healthcare…
Boris Galitsky, Saveli Goldberg Paperback R2,991 Discovery Miles 29 910
Digital Dharma - How AI Can Elevate…
Deepak Chopra Paperback R440 R393 Discovery Miles 3 930
Integration of Cloud Computing with…
M Mangla Hardcover R5,005 Discovery Miles 50 050
Deceitful Media - Artificial…
Simone Natale Hardcover R2,435 Discovery Miles 24 350
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R5,931 Discovery Miles 59 310
African Artificial Intelligence…
Mark Nasila Paperback R350 R312 Discovery Miles 3 120
Applications of Multi-Criteria…
Ilker Ozsahin, Dilber Uzun Ozsahin, … Paperback R2,947 Discovery Miles 29 470
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730
Machine Learning and Data Mining
I Kononenko, M Kukar Paperback R1,903 Discovery Miles 19 030

 

Partners