0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (322)
  • R250 - R500 (919)
  • R500+ (16,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Artificial Intelligence and Deep Learning for Computer Network - Management and Analysis (Hardcover): Sangita Roy, Rajat Subhra... Artificial Intelligence and Deep Learning for Computer Network - Management and Analysis (Hardcover)
Sangita Roy, Rajat Subhra Chakraborty, Jimson Mathew, Arka Prokash Mazumdar, Sudeshna Chakraborty
R3,013 Discovery Miles 30 130 Ships in 9 - 15 working days

Artificial Intelligence and Deep Learning for Computer Network: Management and Analysis aims to systematically collect quality research spanning AI, ML and Deep Learning (DL) applications to diverse sub-topics of computer networks, communications, and security, under a single cover. It also aspires to provide more insights on the applicability of the theoretical similitudes, otherwise a rarity in many such books. Features: A diverse collection of important and cutting-edge topics covered in a single volume. Several chapters on cyber security, an extremely active research area. Recent research results from leading researchers and some pointers to future advancements in methodology. Detailed experimental results obtained from standard data sets. This book serves as a valuable reference book for students, researchers and practitioners who wish to study and get acquainted with the application of cutting-edge AI, ML and DL techniques to network management and cyber security.

Technological Communities and Networks - Triggers and Drivers for Innovation (Paperback): Dimitris Assimakopoulos Technological Communities and Networks - Triggers and Drivers for Innovation (Paperback)
Dimitris Assimakopoulos
R1,412 Discovery Miles 14 120 Ships in 12 - 17 working days

The first book to analyze how new technologies are emerging against a background of continuing globalization of research and development activities. This unique book explores how technological communities and networks shape a broad range of new computer based technologies in regional, national and international contexts. Offering a critique of existing organizational and business models, Assimakopoulos analyzes the structure of a broad range of existing technological communities and networks looking at a range of areas including: Internet security electronic copyright intellectual property rights protection geographic information systems. This text is a key resource for research and development managers, ICT engineers and policy makers, as well as post graduate researchers in knowledge management, technology policy, sociology and economics of innovation or history of science and technology.

Cyber Threats and Nuclear Weapons (Paperback): Herbert Lin Cyber Threats and Nuclear Weapons (Paperback)
Herbert Lin
R636 Discovery Miles 6 360 Ships in 12 - 17 working days

The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively. With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers? Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk.

Routledge Handbook of International Cybersecurity (Paperback): Eneken Tikk, Mika Kerttunen Routledge Handbook of International Cybersecurity (Paperback)
Eneken Tikk, Mika Kerttunen
R1,412 Discovery Miles 14 120 Ships in 9 - 15 working days

The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. The volume is split into four thematic sections: Concepts and frameworks; Challenges to secure and peaceful cyberspace; National and regional perspectives on cybersecurity; Global approaches to cybersecurity. This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general. Chapter 30 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license at https://www.routledge.com/Routledge-Handbook-of-International-Cybersecurity/Tikk-Kerttunen/p/book/9781138489011

Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Hardcover, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R4,176 Discovery Miles 41 760 Ships in 12 - 17 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

The Complete Guide to Cybersecurity Risks and Controls (Hardcover): Anne Kohnke, Dan Shoemaker, Ken E. Sigler The Complete Guide to Cybersecurity Risks and Controls (Hardcover)
Anne Kohnke, Dan Shoemaker, Ken E. Sigler
R3,563 Discovery Miles 35 630 Ships in 12 - 17 working days

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.

Privacy-Preserving Machine Learning (Paperback): Di Zhuang, G. Samaraweera, J Chang Privacy-Preserving Machine Learning (Paperback)
Di Zhuang, G. Samaraweera, J Chang
R1,500 Discovery Miles 15 000 Ships in 12 - 17 working days

Privacy-Preserving Machine Learning is a practical guide to keeping ML data anonymous and secure. You'll learn the core principles behind different privacy preservation technologies, and how to put theory into practice for your own machine learning. Complex privacy-enhancing technologies are demystified through real world use cases forfacial recognition, cloud data storage, and more. Alongside skills for technical implementation, you'll learn about current and future machine learning privacy challenges and how to adapt technologies to your specific needs. By the time you're done, you'll be able to create machine learning systems that preserve user privacy without sacrificing data quality and model performance. Large-scale scandals such as the Facebook Cambridge Analytic a data breach have made many users wary of sharing sensitive and personal information. Demand has surged among machine learning engineers for privacy-preserving techniques that can keep users private details secure without adversely affecting the performance of models.

The Insider's Guide to Outsourcing Risks and Rewards (Paperback): Johann Rost The Insider's Guide to Outsourcing Risks and Rewards (Paperback)
Johann Rost
R1,742 Discovery Miles 17 420 Ships in 12 - 17 working days

It is essential for a corporation to not only survive but thrive in today's global outsourcing environment. The Insider's Guide to Outsourcing Risks and Rewards is a comprehensive and accessible resource that assists an organization in deciding whether it will benefit from pursuing-or not pursuing-such an endeavor. The author, an 18-year veteran of the IT industry, is an experienced consultant, software developer, manager, and entrepreneur. Providing an authoritative and unbiased view, he helps the reader navigate through a number of offshore outsourcing issues related to software management and international business. He examines the potential benefits derived from offshore outsourcing, as well as the possible pitfalls and how to avoid them as they apply to an organization's particular situation. Offering a unique combination of technical and political insight, The Insider's Guide to Outsourcing Risks and Rewards is the one resource to have when trying to figure out your organization's next step.

The Project Manager's Emergency Kit (Paperback): PMP, Ralph L. Kliem The Project Manager's Emergency Kit (Paperback)
PMP, Ralph L. Kliem
R1,801 Discovery Miles 18 010 Ships in 12 - 17 working days

Project success requires a solid understanding and proper implementation of the tools, techniques, and principles of project management. A reference for both the novice and expert project manager, The Project Manager's Emergency Kit provides you with everything you will need to get your project off to a solid start and overcome any emergencies that may arise during the project life cycle. It supplies you with over 200 project management tools, techniques, and principles arranged in alphabetical order. The text provides guidance on how to complete projects on time and within budget while meeting the needs of your customers. It presents easy-to-follow project planning steps covering the responsibilities, work breakdown structures, time and cost estimating, scheduling, resource allocation, and budgeting. The Project Manager's Emergency Kit provides you with straightforward guidelines that will help you overcome any challenges that may arise and deliver a product or service that will satisfy everyone who has a stake in the outcome of your project.

Management of International Networks - Cost-Effective Strategies for the New Telecom Regulations and Services (Paperback):... Management of International Networks - Cost-Effective Strategies for the New Telecom Regulations and Services (Paperback)
Floris Van Den Broek
R1,801 Discovery Miles 18 010 Ships in 12 - 17 working days

Effective management of a communications network can be a difficult and costly activity, and even more so when the network crosses international borders. International network managers face a number of issues that are crucial to strategic decision-making, including the varying telecommunications regulations, operators, and services found within-as well as between-different countries. Focusing on these issues, Management of International Networks clears the way for network managers to make informed, strategic decisions. The author describes each of these issues in detail and develops models-illustrated by actual case studies-that allow a quantified analysis of each. With the ability to quantitatively assess these factors, managers can forecast the potential of cost-effectively managing a network within a given country and make decisions, such as: Where to place hubs for traffic in an international network In what country to expand the network What services to obtain from which operator to ensure a cost-effective network The strong increase in demand for international network services combined with the rapid changes in the telecommunications environment in many countries necessitate a closer examination of international networks and the development of new models and tools that will facilitate management decisions. Management of International Networks fulfills this demand. Network managers, planners, and operators along with consultants, telecommunications lawyers-virtually anyone working with international networks-will find this book an invaluable tool and guide to this dynamic, evolving arena.

Cable and Wireless Networks - Theory and Practice (Hardcover): Mario Marques da Silva Cable and Wireless Networks - Theory and Practice (Hardcover)
Mario Marques da Silva
R3,315 Discovery Miles 33 150 Ships in 12 - 17 working days

Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, cable and wireless communications, and networking security. It describes the most important state-of-the-art fundamentals and system details in the field, as well as many key aspects concerning the development and understanding of current and emergent services. In this book, the author gathers in a single volume current and emergent cable and wireless network services and technologies. Unlike other books, which cover each one of these topics independently without establishing their natural relationships, this book allows students to quickly learn and improve their mastering of the covered topics with a deeper understanding of their interconnection. It also collects in a single source the latest developments in the area, typically only within reach of an active researcher. Each chapter illustrates the theory of cable and wireless communications with relevant examples, hands-on exercises, and review questions suitable for readers with a BSc degree or an MSc degree in computer science or electrical engineering. This approach makes the book well suited for higher education students in courses such as networking, telecommunications, mobile communications, and network security. This is an excellent reference book for academic, institutional, and industrial professionals with technical responsibilities in planning, design and development of networks, telecommunications and security systems, and mobile communications, as well as for Cisco CCNA and CCNP exam preparation.

Introduction to Industrial Internet of Things and Industry 4.0 (Hardcover): Sudip Misra, Chandana Roy, Anandarup Mukherjee Introduction to Industrial Internet of Things and Industry 4.0 (Hardcover)
Sudip Misra, Chandana Roy, Anandarup Mukherjee
R3,272 Discovery Miles 32 720 Ships in 12 - 17 working days

Industrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead author's massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT. The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.

Strategic Cyber Security Management (Paperback): Peter Trim, Yang-Im Lee Strategic Cyber Security Management (Paperback)
Peter Trim, Yang-Im Lee
R1,448 Discovery Miles 14 480 Ships in 9 - 15 working days

This textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to: * evaluate different types of cyber risk * carry out a threat analysis and place cyber threats in order of severity * formulate appropriate cyber security management policy * establish an organization-specific intelligence framework and security culture * devise and implement a cyber security awareness programme * integrate cyber security within an organization's operating system Learning objectives, chapter summaries and further reading in each chapter provide structure and routes to further in-depth research. Firm theoretical grounding is coupled with short problem-based case studies reflecting a range of organizations and perspectives, illustrating how the theory translates to practice, with each case study followed by a set of questions to encourage understanding and analysis. Non-technical and comprehensive, this textbook shows final year undergraduate students and postgraduate students of Cyber Security Management, as well as reflective practitioners, how to adopt a pro-active approach to the management of cyber security. Online resources include PowerPoint slides, an instructor's manual and a test bank of questions.

Business Strategies for the Next-Generation Network (Paperback): Nigel Seel Business Strategies for the Next-Generation Network (Paperback)
Nigel Seel
R1,761 Discovery Miles 17 610 Ships in 12 - 17 working days

Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies, the NGN is not being planned as the next-generation Internet. In its intention and architecture, it is more accurately described as Broadband-ISDN release 2.0. The NGN transition is hard for both practitioners and observers to understand because it weaves together a number of distinct strands: the development of a new architecture and technology base including advanced IT automation systems the development of a portfolio of 'new wave' products and services which exploits the power of the new network the design of a new kind of organization which can utilize the higher levels of automation in the NGN, and reduce costs and the development of an effective transition plan which can smoothly move operators from their current legacy networks, systems and processes to the NGN future. The book begins with a review of the failures of previous attempts by carriers to retool for the future. It describes in detail the technologies and capabilities supporting "new wave'" services, focusing particularly on multimedia interactive services, TV, and Video-on-Demand. The author looks at the IMS layer and how it interworks both downwards into the QoS-enabled IP transport layer and upwards to enable new kinds of applications. However, equal attention is addressed to the business models of players in the value chain, carriers, service providers, broadcasters, and production companies. The author then examines how carriers have attempted to remodel themselves as IP companies along the dimensions of people, processes, and IT automation systems, describing the lessons to be learned from numerous failures. He identifies more innovativebusiness models, exploresPeer-to-Peer networking, and reviews the prospects for

Data-Driven Intelligence in Wireless Networks - Concepts, Solutions, and Applications (Hardcover): Muhammad Khalil Afzal,... Data-Driven Intelligence in Wireless Networks - Concepts, Solutions, and Applications (Hardcover)
Muhammad Khalil Afzal, Muhammad Ateeq, Sung Won Kim
R3,173 Discovery Miles 31 730 Ships in 9 - 15 working days

Covers details on wireless communication problems, conducive for data-driven solutions Provides a comprehensive account of programming languages, tools, techniques, and good practices Provides an introduction to data-driven techniques applied to wireless communication systems Examines data-driven techniques, performance, and design issues in wireless networks Includes several case studies that examine data-driven solution for QoS in heterogeneous wireless networks

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable... Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP - Scalable Distributed Applications and Media Control over Internet (Hardcover)
Radhika Ranjan Roy
R5,612 Discovery Miles 56 120 Ships in 12 - 17 working days

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.

Securing Cyber-Physical Systems (Hardcover): Al-Sakib Khan Pathan Securing Cyber-Physical Systems (Hardcover)
Al-Sakib Khan Pathan
R4,026 Discovery Miles 40 260 Ships in 12 - 17 working days

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.

(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests, Second Edition (Paperback, 2nd Edition): Chapple (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests, Second Edition (Paperback, 2nd Edition)
Chapple
R745 Discovery Miles 7 450 Ships in 12 - 17 working days

Smarter, faster prep for the SSCP exam The (ISC)(2) SSCP Official Practice Tests, 2nd Edition is the only (ISC)(2)-endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapters cover each of the seven domains on the SSCP exam with sixty or more questions per domain, so you can focus your study efforts exactly where you need more review. When you feel well prepared, use the two complete practice exams from Sybex's online interactive learning environment as time trials to assess your readiness to take the exam.: Coverage of all exam objectives, including: Security Operations and Administration Access Controls Risk Identification, Monitoring and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security SSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures. It's ideal for students pursuing cybersecurity degrees as well as those in the field looking to take their careers to the next level.

How Things Work - The Computer Science Edition (Paperback): Charles F. Bowman How Things Work - The Computer Science Edition (Paperback)
Charles F. Bowman
R1,564 Discovery Miles 15 640 Ships in 12 - 17 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

An In-Depth Guide to Mobile Device Forensics (Paperback): Chuck Easttom An In-Depth Guide to Mobile Device Forensics (Paperback)
Chuck Easttom
R1,441 Discovery Miles 14 410 Ships in 12 - 17 working days

Mobile devices are ubiquitous; therefore, mobile device forensics is absolutely critical. Whether for civil or criminal investigations, being able to extract evidence from a mobile device is essential. This book covers the technical details of mobile devices and transmissions, as well as forensic methods for extracting evidence. There are books on specific issues like Android forensics or iOS forensics, but there is not currently a book that covers all the topics covered in this book. Furthermore, it is such a critical skill that mobile device forensics is the most common topic the Author is asked to teach to law enforcement. This is a niche that is not being adequately filled with current titles. An In-Depth Guide to Mobile Device Forensics is aimed towards undergraduates and graduate students studying cybersecurity or digital forensics. It covers both technical and legal issues, and includes exercises, tests/quizzes, case studies, and slides to aid comprehension.

Cloud Computing Networking - Theory, Practice, and Development (Hardcover): Lee Chao Cloud Computing Networking - Theory, Practice, and Development (Hardcover)
Lee Chao
R2,840 Discovery Miles 28 400 Ships in 12 - 17 working days

Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s. As more and more companies and educational institutions plan to adopt a cloud-based IT infrastructure, today's job market requires IT professionals who understand cloud computing and have hands-on experience developing cloud-based networks. Cloud Computing Networking: Theory, Practice, and Development covers the key networking and system administration concepts as well as the vital hands-on skills you need to master cloud technology. This book is designed to help you quickly get started in deploying cloud services for a real-world business. It provides detailed step-by-step instructions for creating a fully functioning cloud-based IT infrastructure using the Microsoft Azure cloud platform. In this environment, you can develop cloud services collaboratively or individually. The book enhances your hands-on skills through numerous lab activities. In these lab activities, you will learn to Implement the following services in a cloud environment: Active Directory, DHCP, DNS, and Certificate Services Configure Windows Server so it can route IP traffic Implement IP Security Policy and Windows Firewall with Advanced Security tools Create a point-to-site connection between Microsoft Azure and a local computer Create a site-to-site connection between Microsoft Azure and an on-premises network Develop a hybrid cloud that integrates Microsoft Azure with a private cloud created on a local network Cloud Computing Networking: Theory, Practice, and Development includes numerous examples, figures, and screen shots to help you understand the information. Each chapter concludes with a summary of the major topics and a set of review questions. With this book, you will soon have the critical knowledge and skills to develop and manage cloud-based networks.

EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.): It Governance... EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.)
It Governance Privacy Team
R751 Discovery Miles 7 510 Ships in 12 - 17 working days

Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.

IT Development in Korea - A Broadband Nirvana? (Paperback): Kwang-Suk Lee IT Development in Korea - A Broadband Nirvana? (Paperback)
Kwang-Suk Lee
R1,406 Discovery Miles 14 060 Ships in 12 - 17 working days

This book investigates the contextual factors that led to Korean society becoming 'broadband heaven' - the most wired nation in the world - by scrutinizing the historical contexts surrounding the Korean Information Infrastructure (KII) project (1995-2005), which aimed to establish a nationwide high-speed backbone network, as well as its later evolution, which involved redesigning the public infrastructure. The book details the hidden mechanisms and the real elements of building the 'broadband heaven': the global constraints conditioning its telecom policies, the dense state-capital linkages, and the bureaucratic desire for social control. It draws on the state-in-society approach to analyze the deformations caused by the symbiosis between the state and big business in implementing the rosy vision of the broadband network. This book provides insights into how to formulate future telecom policies along much more democratically participatory lines while restraining the overwhelming power of the telecom oligopolies and conglomerates. It stands alone as a comprehensive study of the recent East Asian model of IT development, written specifically to examine Korea's socio-historical mechanisms for promoting physical speed and broadband mobility. This book will be important reading to anyone interested in Korean Studies, Information Technology and I.T. Development.

Cloud Native Devops with Kubernetes 2e (Paperback, 2nd ed.): Justin Domingus Cloud Native Devops with Kubernetes 2e (Paperback, 2nd ed.)
Justin Domingus
R1,504 Discovery Miles 15 040 Ships in 12 - 17 working days

Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through the growing Kubernetes ecosystem and provides practical solutions to everyday problems with software tools currently in use. You'll walk through an example containerized application running in Kubernetes step-by-step, from the development environment through the continuous deployment pipeline, exploring patterns you can use for your own applications. Make your development teams lean, fast, and effective by adopting Kubernetes and DevOps principles. Understand containers and Kubernetes-no experience necessary Run your own applications on managed cloud Kubernetes services or on-prem environments Design your own cloud native services and infrastructure Use Kubernetes to manage resource usage and the container lifecycle Optimize clusters for cost, performance, resilience, capacity, and scalability Learn the best tools for developing, testing, and deploying your applications Apply the latest industry practices for observability and monitoring Secure your containers and clusters in production

Intelligent Cities - Enabling Tools and Technology (Hardcover): Pethuru Raj, Anupama C. Raman Intelligent Cities - Enabling Tools and Technology (Hardcover)
Pethuru Raj, Anupama C. Raman
R3,738 Discovery Miles 37 380 Ships in 12 - 17 working days

The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities, the book details the role of various technologies, standards, protocols, and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendors Considers service-oriented architecture and event-driven architecture for smart city applications Explains how to leverage big data analytics for smart city enhancement and improved decision making Includes case studies of intelligent cities, smart homes, buildings, transports, healthcare systems, and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types, including enterprise-scale integration, security, management, and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework, including cloud, big data, Internet of Things, and mobile technologies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Im Abbreviations, Texting & Emoticons
BarCharts Inc Fold-out book or chart R675 Discovery Miles 6 750
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,531 R1,227 Discovery Miles 12 270
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Transforming Your Business with AWS…
P Abdoulaye Paperback R729 Discovery Miles 7 290
AWS Certified Security Study Guide…
Santana Paperback R1,136 Discovery Miles 11 360
Wireless Security Architecture…
J Minella Paperback R913 Discovery Miles 9 130
Hacking For Dummies
K Beaver Paperback R555 Discovery Miles 5 550
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,271 Discovery Miles 12 710
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,390 R1,243 Discovery Miles 12 430

 

Partners