0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (6)
  • R100 - R250 (210)
  • R250 - R500 (792)
  • R500+ (8,234)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Virtual and Mobile Healthcare - Breakthroughs in Research and Practice, VOL 2 (Hardcover): Information Reso Management... Virtual and Mobile Healthcare - Breakthroughs in Research and Practice, VOL 2 (Hardcover)
Information Reso Management Association
R10,915 Discovery Miles 109 150 Ships in 18 - 22 working days
Frontiers of Supercomputing II - A National Reassessment (Hardcover): Karyn R. Ames, Alan Brenner Frontiers of Supercomputing II - A National Reassessment (Hardcover)
Karyn R. Ames, Alan Brenner
R2,644 Discovery Miles 26 440 Ships in 10 - 15 working days

This uniquely comprehensive book brings together the vast amount of technical, economic, and political information and the analyses of supercomputing that have hitherto been buried in the frequently inaccessible "gray literature." Seventy-nine distinguished participants in the second Frontiers of Supercomputing conference offer perceptive and often controversial views on the emerging computing environment in the United States. This title is part of UC Press's Voices Revived program, which commemorates University of California Press's mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1994.

Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Paperback): Rajesh Jugulum Common Data Sense for Professionals - A Process-Oriented Approach for Data-Science Projects (Paperback)
Rajesh Jugulum
R912 Discovery Miles 9 120 Ships in 10 - 15 working days

Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.

Artificial Intelligence - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Information Reso Management... Artificial Intelligence - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Information Reso Management Association
R9,036 Discovery Miles 90 360 Ships in 18 - 22 working days
Virtual and Mobile Healthcare - Breakthroughs in Research and Practice, VOL 1 (Hardcover): Information Reso Management... Virtual and Mobile Healthcare - Breakthroughs in Research and Practice, VOL 1 (Hardcover)
Information Reso Management Association
R10,902 Discovery Miles 109 020 Ships in 18 - 22 working days
Suasive Iterations - Rhetoric, Writing, and Physical Computing (Hardcover): David M. Rieder Suasive Iterations - Rhetoric, Writing, and Physical Computing (Hardcover)
David M. Rieder
R1,581 Discovery Miles 15 810 Ships in 18 - 22 working days
Intelligent Systems for Automated Learning and Adaptation - Emerging Trends and Applications (Hardcover, New): Raymond Chiong Intelligent Systems for Automated Learning and Adaptation - Emerging Trends and Applications (Hardcover, New)
Raymond Chiong
R4,585 Discovery Miles 45 850 Ships in 18 - 22 working days

Intelligent systems are rapidly becoming a central focus of study for researchers as they have the ability to learn and adapt during their existence in order to achieve certain goals and objectives. Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications presents methodologies, architectures, and approaches on experiential automated learning. This critical mass of sought after research assembles the most intriguing and innovative applications, advancements, and leading studies on the methodology of intellectual computing.

The Networknomicon, or SNMP Mastery (Hardcover): Michael W Lucas, Abdul Alhazred The Networknomicon, or SNMP Mastery (Hardcover)
Michael W Lucas, Abdul Alhazred
R1,436 R1,247 Discovery Miles 12 470 Save R189 (13%) Ships in 18 - 22 working days
Artificial Intelligence - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Artificial Intelligence - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,019 Discovery Miles 90 190 Ships in 18 - 22 working days
Biologically Inspired Networking and Sensing - Algorithms and Architectures (Hardcover, New): Pietro Lio, Dinesh Verma Biologically Inspired Networking and Sensing - Algorithms and Architectures (Hardcover, New)
Pietro Lio, Dinesh Verma
R6,119 Discovery Miles 61 190 Ships in 18 - 22 working days

Despite their widespread impact, computer networks that provide the foundation for the World Wide Web and Internet have many limitations. These networks are vulnerable to security threats, break easily, and have a limited ability to respond to changing conditions. Recent research on overcoming these limitations has used biological systems for inspiration, resulting in the development of biologically-inspired computer networks. These networks are designed and developed using principles that are commonly found in natural and biological systems. Biologically Inspired Networking and Sensing: Algorithms and Architectures offers current perspectives and trends in biologically-inspired networking, exploring various approaches aimed at improving network paradigms. Research contained within this compendium of papers and surveys introduces studies in the fields of communication networks, performance modeling, and distributed computing, as well as new advances in networking.

Migrating Legacy Applications - Challenges in Service Oriented Architecture and Cloud Computing Environments (Hardcover, New):... Migrating Legacy Applications - Challenges in Service Oriented Architecture and Cloud Computing Environments (Hardcover, New)
Anca Daniela Ionita, Marin Litoiu, Grace Lewis
R4,968 Discovery Miles 49 680 Ships in 18 - 22 working days

As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud computing, many legacy applications will need to migrate these environments to take advantage of the benefits offered by the service environment. Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments presents a closer look at the partnership between service oriented architecture and cloud computing environments while analyzing potential solutions to challenges related to the migration of legacy applications. This reference is essential for students and university scholars alike.

Handbook of Research on Redesigning the Future of Internet Architectures (Hardcover): Mohamed Boucadair, Christian Jacquenet Handbook of Research on Redesigning the Future of Internet Architectures (Hardcover)
Mohamed Boucadair, Christian Jacquenet
R8,649 Discovery Miles 86 490 Ships in 18 - 22 working days

As the volume of global Internet traffic increases, the Internet is beginning to suffer from a broad spectrum of performance-degrading infrastructural limitations that threaten to jeopardize the continued growth of new, innovative services. In answer to this challenge, computer scientists seek to maintain the original design principles of the Internet while allowing for a more dynamic approach to the manner in which networks are designed and operated. The Handbook of Research on Redesigning the Future of Internet Architectures covers some of the hottest topics currently being debated by the Internet community at large, including Internet governance, privacy issues, service delivery automation, advanced networking schemes, and new approaches to Internet traffic-forwarding and path-computation mechanics. Targeting students, network-engineers, and technical strategists, this book seeks to provide a broad and comprehensive look at the next wave of revolutionary ideas poised to reshape the very foundation of the Internet as we know it.

Modern Computer Architecture (Hardcover): Stephanie Collins Modern Computer Architecture (Hardcover)
Stephanie Collins
R3,285 R2,973 Discovery Miles 29 730 Save R312 (9%) Ships in 18 - 22 working days
Artificial Intelligence - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso Management... Artificial Intelligence - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,056 Discovery Miles 90 560 Ships in 18 - 22 working days
Handbook of Enterprise Systems Architecture in Practice (Hardcover): Handbook of Enterprise Systems Architecture in Practice (Hardcover)
R4,284 Discovery Miles 42 840 Ships in 18 - 22 working days

Enterprise Architecture (EA) is the organizing logic for a firm's core business processes and IT capabilities captured in a set of policies and technical choices. ""Handbook of Enterprise Systems Architecture in Practice"" provides a comprehensive and unified reference overview of practical aspects of enterprise architecture. This premier reference source includes a complete analysis of EA theory, concepts, strategies, implementation challenges, and case studies. The impact of effective enterprise architecture on IT governance, IT portfolio management, IT risks, and IT outsourcing are described in this authoritative reference tool. Researchers and IT professionals will gain insights into how firms can maximize the business value of IT and increase competitiveness.

Computer Architecture Tutorial Using an FPGA - ARM & Verilog Introductions (Hardcover): Robert Dunne Computer Architecture Tutorial Using an FPGA - ARM & Verilog Introductions (Hardcover)
Robert Dunne
R1,537 R1,335 Discovery Miles 13 350 Save R202 (13%) Ships in 18 - 22 working days
The iPad Pro for Seniors - A Ridiculously Simple Guide to the Next Generation of iPad and IOS 12 (Paperback): Brian Norman The iPad Pro for Seniors - A Ridiculously Simple Guide to the Next Generation of iPad and IOS 12 (Paperback)
Brian Norman
R380 Discovery Miles 3 800 Ships in 18 - 22 working days
Essential Computer Hardware Second Edition - The Illustrated Guide to Understanding Computer Hardware (Hardcover): Kevin Wilson Essential Computer Hardware Second Edition - The Illustrated Guide to Understanding Computer Hardware (Hardcover)
Kevin Wilson
R656 Discovery Miles 6 560 Ships in 18 - 22 working days
Cloud Technology - Concepts, Methodologies, Tools, and Applications, Vol 1 (Hardcover): Irma Cloud Technology - Concepts, Methodologies, Tools, and Applications, Vol 1 (Hardcover)
Irma
R17,860 Discovery Miles 178 600 Ships in 18 - 22 working days
HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback): Philip Kortum HCI Beyond the GUI - Design for Haptic, Speech, Olfactory, and Other Nontraditional Interfaces (Paperback)
Philip Kortum
R1,247 Discovery Miles 12 470 Ships in 10 - 15 working days

As technology expands and evolves, one-dimensional, graphical user interface (GUI) design becomes increasingly limiting and simplistic. Designers must meet the challenge of developing new and creative interfaces that adapt to meet human needs and technological trends. HCI Beyond the GUI provides designers with this know how by exploring new ways to reach users that involve all of the human senses. Dr. Kortum gathers contributions from leading human factors designers to present a single reference for professionals, researchers, and students.
Explores the human factors involved in the design and implementation of the nontraditional interfaces, detailing design strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines

Auditing Information Systems (Paperback): Mario Piattini Auditing Information Systems (Paperback)
Mario Piattini
R3,545 Discovery Miles 35 450 Ships in 18 - 22 working days

Society's growing dependence on information technology for survival has elevated the importance of controlling and evaluating information systems. A sound plan for auditing information systems and the technology that supports them is a necessity for organizations to improve the IS benefits and allow the organization to manage the risks associated with technology. Auditing Information Systems gives a global vision of auditing and control, exposing the major techniques and methods. It provides guidelines for auditing the crucial areas of IT--databases, security, maintenance, quality, and communications.

Cloud Technology - Concepts, Methodologies, Tools, and Applications, Vol 2 (Hardcover): Irma Cloud Technology - Concepts, Methodologies, Tools, and Applications, Vol 2 (Hardcover)
Irma
R17,858 Discovery Miles 178 580 Ships in 18 - 22 working days
Microsoft Forefront Security Administration Guide (Paperback): Jesse Varsalone Microsoft Forefront Security Administration Guide (Paperback)
Jesse Varsalone
R1,129 R878 Discovery Miles 8 780 Save R251 (22%) Ships in 10 - 15 working days

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
* First book to address securing an entire Microsoft network from Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
* Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network.

The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition): Anthony Piltzecker The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition)
Anthony Piltzecker
R1,281 Discovery Miles 12 810 Ships in 10 - 15 working days

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services 7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Structure Processing Properties…
Speranta Tanasescu Hardcover R3,049 Discovery Miles 30 490
Carbon Allotropes - Nanostructured…
Jeenat Aslam, Chandrabhan Verma, … Hardcover R4,368 Discovery Miles 43 680
Solid State Chemistry
D.K. Chakrabarty Hardcover R1,015 Discovery Miles 10 150
Genetic Algorithms with Python
Clinton Sheppard Hardcover R856 R812 Discovery Miles 8 120
Handbook of Research on Emergent…
Pandian Vasant, Sirma Zeynep Alparslan Gok, … Hardcover R6,751 Discovery Miles 67 510
Introduction to Chemical Engineering…
Henry C. Foley Paperback R3,120 Discovery Miles 31 200
Hidden Semi-Markov Models - Theory…
Shun-Zheng Yu Paperback R846 Discovery Miles 8 460
Cobalt Compounds and Applications
Yasemin Yildiz, Aynur Manzak Hardcover R3,056 Discovery Miles 30 560
Hybrid Algorithms for Service, Computing…
Jairo R Montoya-Torres, Angel A Juan, … Hardcover R4,583 Discovery Miles 45 830
Solid-Phase Synthesis - A Practical…
Fernando Albericio Hardcover R12,907 Discovery Miles 129 070

 

Partners