0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (216)
  • R250 - R500 (798)
  • R500+ (8,264)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Auditing Information Systems (Paperback): Mario Piattini Auditing Information Systems (Paperback)
Mario Piattini
R3,545 Discovery Miles 35 450 Ships in 18 - 22 working days

Society's growing dependence on information technology for survival has elevated the importance of controlling and evaluating information systems. A sound plan for auditing information systems and the technology that supports them is a necessity for organizations to improve the IS benefits and allow the organization to manage the risks associated with technology. Auditing Information Systems gives a global vision of auditing and control, exposing the major techniques and methods. It provides guidelines for auditing the crucial areas of IT--databases, security, maintenance, quality, and communications.

Microsoft Forefront Security Administration Guide (Paperback): Jesse Varsalone Microsoft Forefront Security Administration Guide (Paperback)
Jesse Varsalone
R1,129 R878 Discovery Miles 8 780 Save R251 (22%) Ships in 10 - 15 working days

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
* First book to address securing an entire Microsoft network from Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
* Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network.

The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition): Anthony Piltzecker The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition)
Anthony Piltzecker
R1,281 Discovery Miles 12 810 Ships in 10 - 15 working days

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services 7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Internet of Things with 8051 and ESP8266 (Hardcover): Anita Gehlot, Rajesh Singh, Bhupendra Singh, Praveen Kumar Malik, Lovi... Internet of Things with 8051 and ESP8266 (Hardcover)
Anita Gehlot, Rajesh Singh, Bhupendra Singh, Praveen Kumar Malik, Lovi Raj Gupta
R2,799 Discovery Miles 27 990 Ships in 10 - 15 working days

Internet of Things with 8051 and ESP8266 provides a platform to get started with the Internet of Things (IoT) with 8051. This book describes programming basics and how devices interface within designed systems. It presents a unique combination of 8051 with ESP8266 and I/O devices for IoT applications supported by case studies to provide the solutions to real-time problems. The programs and circuits have been tested on real hardware and explore different areas in IoT applications. Divided into four sections, it explains the customized boards for IoT applications followed by the means by which 8051 and ESP8266 interface with I/O devices. It spans levels from basic to advanced interfacing with special devices, server design, and data logging with different platforms. Features: Covers how I/O devices interface with 8051 and ESP8266 Explains the basic concepts of interfacing complexity using applications with examples Provides hands-on practice exercises with 8051 and ESP8266 for IoT applications Discusses both case studies and programming tests on real hardware during industrial and student projects Reviews the integration of smart devices with IoT Internet of Things with 8051 and ESP8266 is intended for senior undergraduate and graduate students in electrical and electronics engineering, but anyone with an interest in the professional curriculum of electrical and electronics engineering will find this book a welcome addition to their collection.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R5,768 Discovery Miles 57 680 Ships in 18 - 22 working days
Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R5,773 Discovery Miles 57 730 Ships in 18 - 22 working days
Routing Algorithms in Networks-on-Chip (Hardcover, 2014 ed.): Maurizio Palesi, Masoud Daneshtalab Routing Algorithms in Networks-on-Chip (Hardcover, 2014 ed.)
Maurizio Palesi, Masoud Daneshtalab
R4,882 Discovery Miles 48 820 Ships in 10 - 15 working days

This book provides a single-source reference to routing algorithms for Networks-on-Chip (NoCs), as well as in-depth discussions of advanced solutions applied to current and next generation, many core NoC-based Systems-on-Chip (SoCs). After a basic introduction to the NoC design paradigm and architectures, routing algorithms for NoC architectures are presented and discussed at all abstraction levels, from the algorithmic level to actual implementation. Coverage emphasizes the role played by the routing algorithm and is organized around key problems affecting current and next generation, many-core SoCs. A selection of routing algorithms is included, specifically designed to address key issues faced by designers in the ultra-deep sub-micron (UDSM) era, including performance improvement, power, energy, and thermal issues, fault tolerance and reliability.

Portable Biosensors and Point-of-Care Systems (Hardcover): Spyridon E. Kintzios Portable Biosensors and Point-of-Care Systems (Hardcover)
Spyridon E. Kintzios
R4,459 R3,998 Discovery Miles 39 980 Save R461 (10%) Ships in 18 - 22 working days

Portable Biosensors and Point-of-Care Systems describes the principles, design and applications of a new generation of analytical and diagnostic biomedical devices, characterized by their very small size, ease of use, multi-analytical capabilities and speed to provide handheld and mobile point-of-care (POC) diagnostics. The book is divided in four Parts. Part I is an in-depth analysis of the various technologies upon which portable diagnostic devices and biosensors are built. In Part II, advances in the design and optimization of special components of biosensor systems and handheld devices are presented. In Part III, a wide scope of applications of portable biosensors and handheld POC devices is described, ranging from the support of primary healthcare to food and environmental safety screening. Diverse topics are covered, including counterterrorism, travel medicine and drug development. Finally, Part IV of the book is dedicated to the presentation of commercially available products including a review of the products of point-of-care in-vitro-diagnostics companies, a review of technologies which have achieved a high Technology Readiness Level, and a special market case study of POC infusion systems combined with intelligent patient monitoring. This book is essential reading for researchers and experts in the healthcare diagnostic and analytical sector, and for electronics and material engineers working on portable sensors.

VLSI High-Speed I/O Circuits (Hardcover): Hongjiang Song VLSI High-Speed I/O Circuits (Hardcover)
Hongjiang Song
R1,842 R1,723 Discovery Miles 17 230 Save R119 (6%) Ships in 10 - 15 working days
How to Cheat at Configuring VmWare ESX Server (Paperback): David Rule How to Cheat at Configuring VmWare ESX Server (Paperback)
David Rule
R1,084 R842 Discovery Miles 8 420 Save R242 (22%) Ships in 10 - 15 working days

A virtual evolution in IT shops large and small has begun. VMware s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress proven How to Cheat methodology to configure and build VMware s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz
This book will detail the default and custom installation of VMware s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual machine s root partition from the original clone size to a larger size."

Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019): Mauri Kaipainen, Frank Zenker, Antti Hautamaki,... Conceptual Spaces: Elaborations and Applications (Hardcover, 1st ed. 2019)
Mauri Kaipainen, Frank Zenker, Antti Hautamaki, Peter Gardenfors
R3,112 Discovery Miles 31 120 Ships in 18 - 22 working days

This edited book focuses on concepts and their applications using the theory of conceptual spaces, one of today's most central tracks of cognitive science discourse. It features 15 papers based on topics presented at the Conceptual Spaces @ Work 2016 conference. The contributors interweave both theory and applications in their papers. Among the first mentioned are studies on metatheories, logical and systemic implications of the theory, as well as relations between concepts and language. Examples of the latter include explanatory models of paradigm shifts and evolution in science as well as dilemmas and issues of health, ethics, and education. The theory of conceptual spaces overcomes many translational issues between academic theoretization and practical applications. The paradigm is mainly associated with structural explanations, such as categorization and meronomy. However, the community has also been relating it to relations, functions, and systems. The book presents work that provides a geometric model for the representation of human conceptual knowledge that bridges the symbolic and the sub-conceptual levels of representation. The model has already proven to have a broad range of applicability beyond cognitive science and even across a number of disciplines related to concepts and representation.

Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and... Web-Based Supply Chain Management and Digital Signal Processing - Methods for Effective Information Administration and Transmission (Hardcover)
R. Manjunath
R4,567 Discovery Miles 45 670 Ships in 18 - 22 working days

Digital signal processing is now a growing area of study invading all walks of organizational life, from consumer products to database management. ""Web-Based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission"" presents trends and techniques for successful intelligent decision-making and transfer of products through digital signal processing. A defining collection of field advancements, this publication provides the latest and most complete research in supply chain management with examples and case studies useful for those involved with various levels of management.

Handbook of Network and System Administration (Hardcover, New): Jan Bergstra, Mark Burgess Handbook of Network and System Administration (Hardcover, New)
Jan Bergstra, Mark Burgess
R4,654 Discovery Miles 46 540 Ships in 10 - 15 working days

System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.
This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.
This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.
- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments

A Hobbyist's Guide to THEC64 Mini (Hardcover, Collector's ed.): Holger Wessling A Hobbyist's Guide to THEC64 Mini (Hardcover, Collector's ed.)
Holger Wessling
R796 Discovery Miles 7 960 Ships in 10 - 15 working days
Evolution and Standardization of Mobile Communications Technology (Hardcover, New): DongBack Seo Evolution and Standardization of Mobile Communications Technology (Hardcover, New)
DongBack Seo
R4,888 Discovery Miles 48 880 Ships in 18 - 22 working days

Information and communication technologies (ICT) are a vital component of successful business models. As new technologies emerge, organizations must adapt quickly and strategically to these changes or risk falling behind. Evolution and Standardization of Mobile Communications Technology examines methods of developing and regulating compatibility standards in the ICT industry, assisting organizations in their application of the latest communications technologies in their business practices. Organizations maintain competitive advantage by implementing cutting-edge technologies as soon as they appear. This book serves as a compendium of the most recent research and development in this arena, providing readers with the insight necessary to take full advantage of a wide range of ICT solutions. This book is part of the Advances in IT Standards and Standardization Research series collection.

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,586 Discovery Miles 15 860 Ships in 10 - 15 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

See MIPS Run (Paperback, 2nd edition): Dominic Sweetman See MIPS Run (Paperback, 2nd edition)
Dominic Sweetman
R1,680 Discovery Miles 16 800 Ships in 10 - 15 working days

This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a baseline (the 1st edition used the R3000) from which to compare all other versions of the architecture and assumes that MIPS64 is the main option. The second part is a significant change from the first edition. It provides concrete examples of operating system low level code, by using Linux as the example operating system. It describes how Linux is built on the foundations the MIPS hardware provides and summarizes the Linux application environment, describing the libraries, kernel device-drivers and CPU-specific code. It then digs deep into application code and library support, protection and memory management, interrupts in the Linux kernel and multiprocessor Linux.
Sweetman has revised his best-selling MIPS bible for MIPS programmers, embedded systems designers, developers and programmers, who need an in-depth understanding of the MIPS architecture and specific guidance for writing software for MIPS-based systems, which are increasingly Linux-based.
* Completely new material offers the best explanation available on how Linux runs on real hardware.
* Provides a complete, updated and easy-to-use guide to the MIPS instruction set using the MIPS32 standard as the baseline architecture with the MIPS64 as the main option.
* Retains the same engaging writing style that made the first edition so readable, reflecting the authors 20+ years experience in designing systems based on the MIPS architecture."

Real-Life MDA - Solving Business Problems with Model Driven Architecture (Paperback): Michael Guttman, John Parodi Real-Life MDA - Solving Business Problems with Model Driven Architecture (Paperback)
Michael Guttman, John Parodi
R1,097 Discovery Miles 10 970 Ships in 10 - 15 working days

Model Driven Architecture (MDA) is a new approach to software development that helps companies manage large, complex software projects and save development costs while allowing new technologies that come along to be readily incorporated. Although it is based on many long-standing industry precepts and best practices, such as UML, it is enough of a departure from traditional IT approaches to require some "proof of the pudding." Real-Life MDA is composed of six case studies of real companies using MDA that will furnish that proof. The authors' approach MDA projects by describing all aspects of the project from the viewpoint of the end-usersfrom the reason for choosing an MDA approach to the results and benefits. The case studies are preceded by an introductory chapter and are followed by a wrap-up chapter summarizing lessons learned.
* Written for executives, analysts, architects, and engineers positioned to influence business-oriented software development at the highest levels.
* Filled with concrete examples and analyses of how MDA is relevant for organizations of various sizes.
* Considers a range of uses for MDA from business process analysis to full-scale software modeling and development.
* Presents results for each case study in terms of tangible, measured benefits, including automatically generated code, defect reduction, improved visibility, and ROI."

Functions in Free-format RPG IV (Paperback): Jim Martin Functions in Free-format RPG IV (Paperback)
Jim Martin
R1,252 R1,091 Discovery Miles 10 910 Save R161 (13%) Ships in 18 - 22 working days

Written especially for programmers adopting a free-format style, this manual explores the role of functions in writing RPG IV programs. Demonstrating the potential of functions, many topics are explored such as details about existing RPG IV built-in functions, writing new functions, using ILE concepts to use C functions, and utilizing IBM API's functions. Explaining how to write small programs, either as sub-procedures or modules, and how to gather those parts together to make programs that are easy to write and maintain, this is a natural next step for programmers familiar with a free-format style of coding.

How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R879 R734 Discovery Miles 7 340 Save R145 (16%) Ships in 10 - 15 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative... Analog Circuit Theory and Filter Design in the Digital World - With an Introduction to the Morphological Method for Creative Solutions and Design (Hardcover, 1st ed. 2019)
George S. Moschytz
R3,252 Discovery Miles 32 520 Ships in 18 - 22 working days

This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.

Linux - A Comprehensive Guide to Linux Operating System and Command Line (Hardcover): Sam Griffin Linux - A Comprehensive Guide to Linux Operating System and Command Line (Hardcover)
Sam Griffin
R558 R513 Discovery Miles 5 130 Save R45 (8%) Ships in 18 - 22 working days
Advancing Consumer-Centric Fog Computing Architectures (Hardcover): Kashif Munir Advancing Consumer-Centric Fog Computing Architectures (Hardcover)
Kashif Munir
R5,214 Discovery Miles 52 140 Ships in 18 - 22 working days

Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.

Securing the Information Infrastructure (Hardcover): Joseph Migga Kizza, Florence Migga Kizza Securing the Information Infrastructure (Hardcover)
Joseph Migga Kizza, Florence Migga Kizza
R2,630 Discovery Miles 26 300 Ships in 18 - 22 working days

Explores the full range of issues - moral, ethical, social, legal, and technological - involved in developing firm controls and best practices to secure the ever growing information infrastructure upon which societies and individuals depend.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The XML Companion
Neil Bradley Paperback R1,063 R272 Discovery Miles 2 720
Developing Business Applications for the…
Christian Hur, Laura Ubelhor Paperback R1,819 R1,577 Discovery Miles 15 770
Geospatial Web Services - Advances in…
Peisheng Zhao Hardcover R4,664 Discovery Miles 46 640
Crowdsourcing of Sensor Cloud Services
Azadeh Ghari Neiat, Athman Bouguettaya Hardcover R2,854 R1,683 Discovery Miles 16 830
Biomedical Diagnostics and Clinical…
Manuela Pereira, Mario Freire Hardcover R6,154 Discovery Miles 61 540
Spring Security in Action
Laurentiu Spilca Paperback R1,301 Discovery Miles 13 010
Pragmatic Programmer, The - Your journey…
David Thomas, Andrew Hunt Hardcover R1,045 R883 Discovery Miles 8 830
XML in Data Management - Understanding…
Peter Aiken, M. David Allen Paperback R1,150 Discovery Miles 11 500
Web Services Research for Emerging…
Hardcover R4,733 Discovery Miles 47 330
Bridging UX and Web Development - Better…
Jack Moffett Paperback R853 Discovery Miles 8 530

 

Partners