0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (301)
  • R250 - R500 (861)
  • R500+ (15,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Applied Video Processing in Surveillance and Monitoring Systems (Hardcover): Nilanjan Dey, Amira Ashour, Suvojit Acharjee Applied Video Processing in Surveillance and Monitoring Systems (Hardcover)
Nilanjan Dey, Amira Ashour, Suvojit Acharjee
R6,027 Discovery Miles 60 270 Ships in 12 - 17 working days

Video monitoring has become a vital aspect within the global society as it helps prevent crime, promote safety, and track daily activities such as traffic. As technology in the area continues to improve, it is necessary to evaluate how video is being processed to improve the quality of images. Applied Video Processing in Surveillance and Monitoring Systems investigates emergent techniques in video and image processing by evaluating such topics as segmentation, noise elimination, encryption, and classification. Featuring real-time applications, empirical research, and vital frameworks within the field, this publication is a critical reference source for researchers, professionals, engineers, academicians, advanced-level students, and technology developers.

Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback): Mitsuru Kodama Managing IT for Innovation - Dynamic Capabilities and Competitive Advantage (Paperback)
Mitsuru Kodama
R1,224 Discovery Miles 12 240 Ships in 9 - 15 working days

With recent advances in IT in areas such as AI and IoT, collaboration systems such as business chat, cloud services, conferencing systems, and unified communications are rapidly becoming widely used as new IT applications in global corporations' strategic activities. Through in-depth longitudinal studies of global corporations, the book presents a new theoretical framework and implications for IT-enabled dynamic capabilities using collaboration systems from the perspective of micro strategy theory and organization theory. The content of the book is based on longitudinal analyses that employ various qualitative research methods including ethnography, participant observation, action research and in-depth case studies of global corporations in Europe, the United States and Asia that actively use collaboration systems. It presents a new concept of micro dynamism whereby dynamic "IT-enabled knowledge communities" such as "IT-enabled communities of practice" and "IT-enabled strategic communities" create "IT-enabled dynamic capabilities" through the integration of four research streams - an information systems view, micro strategy view, micro organization view and knowledge-based view. The book demonstrates that collaboration systems create, maintain and develop "IT-enabled knowledge communities" within companies and are strategic IT applications for enhancing the competitiveness of companies in the ongoing creation of new innovation and the realization of sustainable growth in a 21st century knowledge-based society. This book is primarily written for academics, researchers and graduate students, but will also offer practical implications for business leaders and managers. Its use is anticipated not only in business and management schools, graduate schools and university education environments around the world but also in the broad business environment including management and leadership development training.

A System Administrator's Guide to Sun Workstations (Hardcover, New): George Becker, Kathy Slattery A System Administrator's Guide to Sun Workstations (Hardcover, New)
George Becker, Kathy Slattery
R3,025 Discovery Miles 30 250 Ships in 12 - 17 working days

This guide to Sun Administration is a reference manual written by Sun administrators for Sun administrators. It is not intended to be a complete guide to Unix System Administration; instead it will concentrate on the special issues that are particular to the Sun environment. The authors will present a clearer and more in-depth explanation of the issues involved in managing SunOS 4.0 through 4.0.3 than is currently available. The reader will be led through the basic steps necessary to install and maintain a network of Sun computers. Along the way, helpful ideas will be given concerning NFS, YP, backup and restore procedures, as well as many useful installation tips that can make a Sun system administrator's job less painful.

Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.): Chris McDonald Converged Networking - Data and Real-time Communications over IP (Hardcover, 2003 ed.)
Chris McDonald
R3,236 Discovery Miles 32 360 Ships in 10 - 15 working days

This volume forms the edited proceedings of the Sixth International Symposium on Communications Interworking, held in Perth, Western Australia, from 13-16 October, 2002. In total, 39 research papers were submitted for consideration, and after full refereeing by international referees, 27 papers from authors in 11 countries were accepted for publication. Invited keynote addresses were presented by Dr Hugh Bradlow, Chief Technology Offleer for Telstra Corporation, Australia, and Dr Sathya Rao, Director ofTelscom A.G., Switzerland. The symposium brought together 60 active international researchers and telecommunications engineers to discuss the important questions as to whether there is a convergence of all communications, including real-time communications, over the Internet Protocol (IP), and whether existing IP technology is capable of supporting this convergence, or whether it requires further development of that technology. The papers selected to appear in this volume make an important and timely contribution to this debate. Specific symposium paper sessions were held to present and discuss ernerging research on the topics of converged networking, real-time communications over IP, quality of service, routing and metrics, ernerging issues in mobile networks, differentiated services, and wireless networking.

Resource Management and Efficiency in Cloud Computing Environments (Hardcover): Ashok Kumar Turuk, Bibhudatta Sahoo, Sourav... Resource Management and Efficiency in Cloud Computing Environments (Hardcover)
Ashok Kumar Turuk, Bibhudatta Sahoo, Sourav Kanti Addya
R5,757 Discovery Miles 57 570 Ships in 12 - 17 working days

Today's advancements in technology have brought about a new era of speed and simplicity for consumers and businesses. Due to these new benefits, the possibilities of universal connectivity, storage and computation are made tangible, thus leading the way to new Internet-of Things solutions. Resource Management and Efficiency in Cloud Computing Environments is an authoritative reference source for the latest scholarly research on the emerging trends of cloud computing and reveals the benefits cloud paths provide to consumers. Featuring coverage across a range of relevant perspectives and topics, such as big data, cloud security, and utility computing, this publication is an essential source for researchers, students and professionals seeking current research on the organization and productivity of cloud computing environments. Topics Covered: Big Data Cloud Application Services (SaaS) Cloud Security Hybrid Cloud Internet of Things (IoT) Private Cloud Public Cloud Service Oriented Architecture (SOA) Utility Computing Virtualization Technology

Web Dynpro ABAP for Practitioners (Hardcover, 2nd ed. 2013): Ulrich Gellert, Ana Daniela Cristea Web Dynpro ABAP for Practitioners (Hardcover, 2nd ed. 2013)
Ulrich Gellert, Ana Daniela Cristea
R1,831 R1,670 Discovery Miles 16 700 Save R161 (9%) Ships in 12 - 17 working days

Web Dynpro ABAP, a NetWeaver web application user interface tool from SAP, enables web programming connected to SAP Systems. The authors' main focus was to create a book based on their own practical experience. Each chapter includes examples which lead through the content step-by-step and enable the reader to gradually explore and grasp the Web Dynpro ABAP process. The authors explain in particular how to design Web Dynpro components, the data binding and interface methods, and the view controller methods. They also describe the other SAP NetWeaver Elements (ABAP Dictionary, Authorization) and the integration of the Web Dynpro Application into the SAP NetWeaver Portal. The new edition has been expanded to include chapters on subjects such as POWER Lists; creating the Modal Windows and External Windows; using Web Dynpro application parameters and Shared Objects to communicate between the Web Dynpro ABAP Application and Business Server Pages; and creating multi-language mails using Web Dynpro ABAP.

Computer Network Security (Hardcover, 2005 ed.): Joseph Migga Kizza Computer Network Security (Hardcover, 2005 ed.)
Joseph Migga Kizza
R1,766 Discovery Miles 17 660 Ships in 12 - 17 working days

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.): Wolfgang Minker, Dirk Buhler, Laila... Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.)
Wolfgang Minker, Dirk Buhler, Laila Dybkjaer
R4,641 Discovery Miles 46 410 Ships in 12 - 17 working days

The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction. Spoken dialogue is a key factor in ensuring natural and user-friendly interaction with such devices which are meant not only for computer specialists, but also for everyday users.

Speech supports hands-free and eyes-free operation, and becomes a key alternative interaction mode in mobile environments, e.g. in cars where driver distraction by manually operated devices may be a significant problem. On the other hand, the use of mobile devices in public places, may make the possibility of using alternative modalities possibly in combination with speech, such as graphics output and gesture input, preferable due to e.g. privacy issues. Researchers' interest is progressively turning to the integration of speech with other modalities such as gesture input and graphics output, partly to accommodate more efficient interaction and partly to accommodate different user preferences.

This book:
-combines overview chapters of key areas in spoken multimodal dialogue (systems and components, architectures, and evaluation) with chapters focussed on particular applications or problems in the field;
-focuses on the influence of the environment when building and evaluating an application.

Audience: Computer scientists, engineers, and others who work in the area of spoken multimodal dialogue systems in academia and in the industry;
graduatestudents and Ph.D. students specialising in spoken multimodal dialogue systems in general, or focusing on issues in these systems in mobile environments in particular.

Performance Analysis of Computer Networks (Hardcover, 2013 ed.): Matthew N.O Sadiku, Sarhan M. Musa Performance Analysis of Computer Networks (Hardcover, 2013 ed.)
Matthew N.O Sadiku, Sarhan M. Musa
R2,048 Discovery Miles 20 480 Ships in 12 - 17 working days

This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and simulation are introduced as the major tools analysts have access to. It presents performance analysis on local, metropolitan, and wide area networks, as well as on wireless networks. It concludes with a brief introduction to self-similarity. Designed for a one-semester course for senior-year undergraduates and graduate engineering students, it may also serve as a fingertip reference for engineers developing communication networks, managers involved in systems planning, and researchers and instructors of computer communication networks.

Mobile Computing (Hardcover, 1996 ed.): Tomasz Imielinski, Henry F. Korth Mobile Computing (Hardcover, 1996 ed.)
Tomasz Imielinski, Henry F. Korth
R8,819 Discovery Miles 88 190 Ships in 12 - 17 working days

The desire and the necessity for accessing and processing information stored in computer networks anytime and anywhere' has been the impetus for the growing interest in mobile computing research. Wired computing networks and end devices such as PCs and workstations have effectively extended the data-only networking capability of a few years ago to sophisticated multimedia networking. The cost of such transformation to the end user turns out to be very nominal. Undoubtedly the wireless access technology has given a big boost to mobile cellular telephony and data networking. Processing general purpose multimedia information requires, besides higher bandwidth, means for controlling the available bandwidth and caring for quality of service issues. This problem is accentuated by the need for providing such service in the presence of wireless physical layer and host mobility. Thus, tetherless and ubiquitous mobile and wireless computing systems should carefully combine advances in computer networking and wireless communication. While several experimental mobile computing platforms have sprung up, much research is needed to overcome technological obstacles in low power system design, sustainable battery life, unreliability and limited bandwidth of the wireless channel. Mobile Computing addresses some aspects of this new but rapidly growing field of research. A total of eight papers span the areas of protocols, network architecture, and performance issues. All of the papers deal with the complexities of host mobility in a wireless setting. They expose several challenges that affect system design of mobile computing networks at various levels. By addressing these challenges in an efficient andcost-effective manner, it is hoped that user-friendly, seamless and faster networks will emerge to serve the sophisticated and demanding applications of mobile users. Mobile Computing serves as an excellent reference, providing insights into some of the most important issues in mobile and wireless computing.

Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010,... Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings (Hardcover, 2010 Ed.)
Kai Rannenberg, Vijay Varadharajan, Christian Weber
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for papers went out with the challenging motto of "Security & Privacy Silver Linings in the Cloud" building a bridge between the long standing issues of security and privacy and the most recent developments in information and commu- cation technology. It attracted 102 submissions. All of them were evaluated on the basis of their significance, novelty, and technical quality by at least five member of the Program Committee. The Program Committee meeting was held electronically over a period of a week. Of the papers submitted, 25 were selected for presentation at the conference; the acceptance rate was therefore as low as 24. 5% making SEC 2010 a highly competitive forum. One of those 25 submissions could unfortunately not be included in the proceedings, as none of its authors registered in time to present the paper at the conference.

Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.): Shailendra Jain, Mark... Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.)
Shailendra Jain, Mark Hayward, Sharad Kumar
R4,609 Discovery Miles 46 090 Ships in 12 - 17 working days

The companies that provide the Internet to the rest of the world do not have the luxury of setting high expectations and assuming they will be met. These Internet infrastructure companies (IICs) are responsible for delivering the Internet's promise, including everything from eBusiness and mobile Internet applications to optical services and high-speed access. The Internet's audience takes this promise for granted, and IICs face the daunting challenge of making the Internet, and networks like it, do what the audience expects them to. To meet the expectations they face, IICs must harness the power of their operations support systems (OSSs) - the software systems in the background they use to create, manage, maintain, manipulate and adapt their networks to serve customers reliably and rapidly.
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure. This book provides a source of reference and education to learn the language, methods, and technologies associated with the OSS market. It examines the Internet infrastructure supply chain and how it will be automated. Finally, it brings together a wealth of proven knowledge and advice, gathered from BusinessEdge Solutions' extensive OSS experience, that broadband providers can use to minimize their OSS risks while maximizing their ability to differentiate and compete.

Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.): Srihari Nelakuditi, Zhi-Li Zhang Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.)
Srihari Nelakuditi, Zhi-Li Zhang
R1,654 Discovery Miles 16 540 Ships in 10 - 15 working days

Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead.

Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network.

Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.

Privacy, Identity, and Cloud Computing (Hardcover): Harry Katzan Privacy, Identity, and Cloud Computing (Hardcover)
Harry Katzan
R782 R659 Discovery Miles 6 590 Save R123 (16%) Ships in 10 - 15 working days

Three important technology issues face professionals in today's business, education, and government world. In "Privacy, Identity, and Cloud Computing, " author and computer expert Dr. Harry Katzan Jr. addresses the subjects of privacy and identity as they relate to the new discipline of cloud computing, a model for providing on-demand access to computing service via the Internet. A compendium of eight far-reaching papers, "Privacy, Identity, and Cloud Computing" thoroughly dissects and discusses the following: The privacy of cloud computing Identity as a service Identity analytics and belief structures Compatibility relations in identity analysis Conspectus of cloud computing Cloud computing economics: Democratization and monetization of services Ontological view of cloud computing Privacy as a service Katzan provides not only a wealth of information, but gives exposure to these topics facing today's computer users. Ultimately, these are important facets of modern computing, and all their implications must be considered thoroughly in anticipation of future developments.

Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.): Dongmin Kim, Salim Hariri Virtual Computing - Concept, Design, and Evaluation (Hardcover, 2001 ed.)
Dongmin Kim, Salim Hariri
R3,094 Discovery Miles 30 940 Ships in 10 - 15 working days

The evolution of modern computers began more than 50 years ago and has been driven to a large extend by rapid advances in electronic technology during that period. The first computers ran one application (user) at a time. Without the benefit of operating systems or compilers, the application programmers were responsible for managing all aspects of the hardware. The introduction of compilers allowed programmers to express algorithms in abstract terms without being concerned with the bit level details of their implementation. Time sharing operating systems took computing systems one step further and allowed several users and/or applications to time share the computing services of com puters. With the advances of networks and software tools, users and applications were able to time share the logical and physical services that are geographically dispersed across one or more networks. Virtual Computing (VC) concept aims at providing ubiquitous open computing services in analogous way to the services offered by Telephone and Elec trical (utility) companies. The VC environment should be dynamically setup to meet the requirements of a single user and/or application. The design and development of a dynamically programmable virtual comput ing environments is a challenging research problem. However, the recent advances in processing and network technology and software tools have successfully solved many of the obstacles facing the wide deployment of virtual computing environments as will be outlined next."

Digital Creativity - Individuals, Groups, and Organizations (Hardcover, 2013 ed.): Kun Chang Lee Digital Creativity - Individuals, Groups, and Organizations (Hardcover, 2013 ed.)
Kun Chang Lee
R2,998 Discovery Miles 29 980 Ships in 10 - 15 working days

As the use of digital technology has grown, so necessarily has the body of research into its effects at the personal, group and organizational levels, but there is no one book that looks at how digital technology has specifically influenced creativity. Digital Creativity: Individuals, Groups, and Organizations discusses all spectrums of influence that digital technologies have on creativity from the individual, team, and organization level. This book offers a new kind of creativity model encompassing all three levels of creativity. It combines each level into a unified creativity framework in which organizations regardless of their industry types could benefit in reengineering their business processes as well as strategies. For this purpose, the book considers various factors that would affect creativity- individuals' digital efficacy, heterogeneity among members (i.e., age, gender, races, tenure, education, and culture, etc), CMC (Computer-Mediated Communication), task complexity, exploitation, exploration, culture, organizational learning capability, and knowledge networks among members. This book introduces a theorized and systematic glimpse into the exciting realm of digital creativity. It is organized with contents starting from individuals to teams and ultimately to organizations, each with various techniques and cases. Each chapter shows how individuals, teams, and organizations can become more creative through use of digital technologies.

QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020): K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy QoS Routing Algorithms for Wireless Sensor Networks (Hardcover, 1st ed. 2020)
K.R. Venugopal, Shiv Prakash T., M. Kumaraswamy
R3,005 Discovery Miles 30 050 Ships in 10 - 15 working days

This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs). Unlike other books on the topic, it focuses on the networking aspects of WSNs, discussing the most important networking issues, including network architecture design, medium access control, routing and data dissemination, node clustering, node localization, query processing, data aggregation, transport and quality of service, time synchronization, and network security. Featuring contributions from researchers, this book strikes a balance between fundamental concepts and new technologies, providing readers with unprecedented insights into WSNs from a networking perspective. It is essential reading for a broad audience, including academics, research engineers, and practitioners, particularly postgraduate/postdoctoral researchers and engineers in industry. It is also suitable as a textbook or supplementary reading for graduate computer engineering and computer science courses.

Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.): Domine Leenaerts, Wim M.G.Van Bokhoven Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.)
Domine Leenaerts, Wim M.G.Van Bokhoven
R4,586 Discovery Miles 45 860 Ships in 12 - 17 working days

Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.

Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover): Issa Traore, Ahmed Awad E Ahmed Continuous Authentication Using Biometrics - Data, Models, and Metrics (Hardcover)
Issa Traore, Ahmed Awad E Ahmed
R5,470 Discovery Miles 54 700 Ships in 12 - 17 working days

User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the leading experts in this recent, fast growing research area. These chapters collectively provide a thorough and concise introduction to the field of biometric-based continuous authentication. The book covers the conceptual framework underlying continuous authentication and presents detailed processing models for various types of practical continuous authentication applications.

The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.): Joan Daemen, Vincent Rijmen The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.)
Joan Daemen, Vincent Rijmen 1
R2,768 Discovery Miles 27 680 Ships in 10 - 15 working days

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,050 R918 Discovery Miles 9 180 Save R132 (13%) Ships in 9 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Smart Micro-Grid Systems Security and Privacy (Hardcover, 1st ed. 2018): Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph... Smart Micro-Grid Systems Security and Privacy (Hardcover, 1st ed. 2018)
Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel
R2,831 Discovery Miles 28 310 Ships in 12 - 17 working days

This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart microgrids instead, offers a reliable power solution but, as is the case in smart grids, a key issue is guaranteeing usability, trust, and reliability while protecting against energy theft. This book considers aspects such as state estimation, capacity planning, demand forecasting, price signals, and demand management with respect to energy theft. Straight-forward approaches to provoking energy theft on smart grids and micro-grids include mis-recordings power consumption/generation information and exposures of personally identifiable information or sensitive information. Attack models based on mis-recorded generation and/or consumption data and exposure of personally identifiable information, are also studied. In each case, countermeasures are proposed to circumvent the power theft attacks raised. Researchers in Smart Micro-grids security, cyber-physical systems, and critical infrastructure will want to purchase this book as a reference. Professionals, Researchers, Academics and students working in security general and Security of Critical Infrastructure, Privacy, and Data Sharing will also want to purchase this book as a reference.

Computer-Supported Cooperative Work - Introduction to Distributed Applications (Hardcover, 2000 ed.): Uwe M. Borghoff, Johann... Computer-Supported Cooperative Work - Introduction to Distributed Applications (Hardcover, 2000 ed.)
Uwe M. Borghoff, Johann H. Schlichter
R2,907 R1,764 Discovery Miles 17 640 Save R1,143 (39%) Ships in 12 - 17 working days

The terms groupware and CSCW (Computer-Supported Cooperative Work) have received significant attention in computer science and related disciplines for quite some time now. This book has two main objectives: first, to outline the meaning of both terms, and second, to point out both the numerous opportunities for users of CSCW systems and the risks of applying them. The book introduces in detail an interdisciplinary application area of distributed systems, namely the computer support of individuals trying to solve a problem in cooperation with each other but not necessarily having identical work places or working times. CSCW can be viewed as a synergism between the areas of distributed systems and (multimedia) communications on the one hand and those of information science and socio-organizational theory on the other hand. Thus, the book is addressed to students of all these disciplines, as well as to users and developers of systems with group communication and cooperation as top priorities.

Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.): Subrata Goswami Internet Protocols - Advances, Technologies and Applications (Hardcover, 2003 ed.)
Subrata Goswami
R4,616 Discovery Miles 46 160 Ships in 12 - 17 working days

IP technology has progressed from being a scientific topic to being one of the most popular technologies in networking. Concurrently, a number of new innovations and technological advances have been developed and brought to the marketplace. These new ideas, concepts and products are likely to have a tremendous influence on businesses and on our everyday lives. This book addresses many of these newer technological developments and provides insights for engineers and scientists developing new technological components, devices and products. explores how they are being implemented in the real world. The author examines numerous implementation details related to IP equipment and software. The material is organized by application so that readers can better understand the uses of IP technology. Included are details of implementation issues and state-of-the-art equipment and software. descriptions of Cisco 12410 GSR and Juniper M160, and IP software stack details are also included for several popular operating systems such as Windows, BSD, VxWorks and Linux.

Handbook of Research on Social and Organizational Liabilities in Information Security (Hardcover): Manish Gupta, Raj Sharman Handbook of Research on Social and Organizational Liabilities in Information Security (Hardcover)
Manish Gupta, Raj Sharman
R7,438 Discovery Miles 74 380 Ships in 12 - 17 working days

As the diffusion and use of technology applications have accelerated in organizational and societal domains, behavioral and social dynamics have inevitably created the potential for negative as well as positive consequences and events associated with technology. A pressing need within organizations and societies has therefore emerged for robust, proactive information security measures that can prevent as well as ameliorate breaches, attacks, and abuses.""The Handbook of Research on Social and Organizational Liabilities in Information Security"" offers a critical mass of insightful, authoritative articles on the most salient contemporary issues of managing social and human aspects of information security. Aimed at providing immense scholarly value to researchers, academicians, and practitioners in the area of information technology and security, this landmark reference collection provides estimable coverage of pertinent issues such as employee surveillance, information security policies, and password authentication.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CISA - Certified Information Systems…
Cannon Paperback R1,686 R1,298 Discovery Miles 12 980
Handbook of Research on Cyber Security…
Jena Om Prakash, H L Gururaj, … Hardcover R7,230 R6,674 Discovery Miles 66 740
Advancements in Security and Privacy…
Ashwani Kumar, Seelam Sai Satyanarayana Reddy Hardcover R6,670 Discovery Miles 66 700
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,736 Discovery Miles 87 360
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Guide to Networking Essentials
Greg Tomsho Paperback R1,423 R1,271 Discovery Miles 12 710
Service management and scheduling in…
Yongkui Liu, Lin Zhang Hardcover R4,367 Discovery Miles 43 670
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Security Engineering - A Guide to…
R. Anderson Hardcover R1,358 Discovery Miles 13 580
Computer Networking: A Top-Down…
James Kurose, Keith Ross Paperback R2,434 R2,220 Discovery Miles 22 200

 

Partners